<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?><!--<!DOCTYPE rfc SYSTEM "rfc2629.dtd">-->
<?rfc toc="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc subcompact="no"?>
<?rfc-ext parse-xml-in-artwork="yes" ?>
<?rfc-ext allow-markup-in-artwork="yes" ?>
<?rfc-ext authors-section="end" ?>
<?rfc-ext sec-no-trailing-dots="yes" ?>

<rfc xmlns:x='http://purl.org/net/xml2rfc/ext' xmlns:ed="http://greenbytes.de/2002/rfcedit" ipr="full3667" updates="2518" docName="draft-reschke-webdav-locking-07" ed:entered-by="julian.reschke@greenbytes.de">
  <x:link rel="Start" href="http://greenbytes.de/tech/webdav/#draft-reschke-webdav-locking"/>
  <x:link rel="Bookmark" title="IETF WEBDAV Working Group" href="http://ftp.ics.uci.edu/pub/ietf/webdav/"/>
  <x:link rel="Alternate" title="(latest)" href="http://greenbytes.de/tech/webdav/draft-reschke-webdav-locking-latest.html"/>
  <x:link rel="Alternate" title="draft 08" href="http://greenbytes.de/tech/webdav/draft-reschke-webdav-locking-08.html"/>
  <x:link rel="Alternate" title="draft 07" href="http://greenbytes.de/tech/webdav/draft-reschke-webdav-locking-07.html"/>
  <x:link rel="Alternate" title="draft 06" href="http://greenbytes.de/tech/webdav/draft-reschke-webdav-locking-06.html"/>
  <x:link rel="Alternate" title="draft 05" href="http://greenbytes.de/tech/webdav/draft-reschke-webdav-locking-05.html"/>
  <x:link rel="Alternate" title="draft 04" href="http://greenbytes.de/tech/webdav/draft-reschke-webdav-locking-04.html"/>
  <x:link rel="Alternate" title="draft 03" href="http://greenbytes.de/tech/webdav/draft-reschke-webdav-locking-03.html"/>
  <x:link rel="Alternate" title="draft 02" href="http://greenbytes.de/tech/webdav/draft-reschke-webdav-locking-02.html"/>
  <x:link rel="Alternate" title="draft 01" href="http://greenbytes.de/tech/webdav/draft-reschke-webdav-locking-01.html"/>
  <x:link rel="Alternate" title="draft 00" href="http://greenbytes.de/tech/webdav/draft-reschke-webdav-locking-00.html"/>
  <x:link rel="next" href="http://greenbytes.de/tech/webdav/draft-reschke-webdav-locking-08.html"/>
  <x:link rel="prev" href="http://greenbytes.de/tech/webdav/draft-reschke-webdav-locking-06.html"/>
	<front>
  <title abbrev="WebDAV Locking Protocol">Web Distributed Authoring and Versioning (WebDAV) Locking Protocol</title>

  <author initials="J. F." surname="Reschke" fullname="Julian F. Reschke">
    <organization abbrev="greenbytes">greenbytes GmbH</organization>
    <address>
      <postal>
        <street>Salzmannstrasse 152</street>
        <city>Muenster</city><region>NW</region><code>48159</code>
        <country>Germany</country>
      </postal>
      <phone>+49 251 2807760</phone>	
      <facsimile>+49 251 2807761</facsimile>	
      <email>julian.reschke@greenbytes.de</email>	
      <uri>http://greenbytes.de/tech/webdav/</uri>	
    </address>
  </author>

  <date month="February" year="2005"/>
  <!--<workgroup>WEBDAV Working Group</workgroup>-->
  
  <abstract>
    <t>
      This document specifies a set of methods and headers ancillary to
      HTTP/1.1 (RFC2616) and Distributed Authoring and Versioning (WebDAV, RFC2518) for the management of resource
      locking (collision avoidance).  It updates those sections from
      RFC2518 that specify WebDAV's locking features.
    </t>
  </abstract>

  
  <note title="Editorial Note (to be removed by RFC Editor before publication)">
    <t>
      <cref source="reschke">
        Note that this document is not a product of the WebDAV working group.
        It is just an experiment to study the feasability of extracing the
        locking feature into a separate specification.
      </cref>
    </t>
    <t>
      Distribution of this document is unlimited. Please send comments to the 
      WebDAV working group at <eref target="mailto:w3c-dist-auth@w3.org"/>, which may be joined by sending a message with subject 
      "subscribe" to <eref target="mailto:w3c-dist-auth-request@w3.org"/>.
      Discussions of the WEBDAV working group are archived at <eref target="http://lists.w3.org/Archives/Public/w3c-dist-auth/"/>.               
    </t>
    <t>
      An issues list and XML and HTML versions of this draft are available from <eref target="http://greenbytes.de/tech/webdav/#draft-reschke-webdav-locking"/>.
    </t>
  </note>
    
</front>

<middle>

<ed:issue xmlns='http://www.w3.org/1999/xhtml' name="import-gulp" type="change" status="open">
  <ed:item entered-by="julian.reschke@greenbytes.de" date="2004-05-25">
    Make specification text compatible with GULP where it isn't. Integrate
    GULP as normative specification of the locking behaviour.
  </ed:item>
</ed:issue>

<ed:issue xmlns='http://www.w3.org/1999/xhtml' name="edit" type="edit" status="open">
  <ed:item entered-by="julian.reschke@greenbytes.de" date="2004-05-25">
    Umbrella issue for editorial fixes/enhancements.
  </ed:item>
</ed:issue>

<ed:issue xmlns='http://www.w3.org/1999/xhtml' name="lock_state_auth_principal" type="change" status="closed">
  <ed:item entered-by="julian.reschke@greenbytes.de" date="2005-02-13">
    Mention the principal that was authenticated when the lock was created
    as part of the state of a lock; disambiguate with what previously was
    called "lock owner".
  </ed:item>
  <ed:resolution datetime="2005-02-13">
    Done.
  </ed:resolution>
</ed:issue>

<ed:issue xmlns='http://www.w3.org/1999/xhtml' name="abnf" type="change" status="closed">
  <ed:item entered-by="julian.reschke@greenbytes.de" date="2005-02-12">
    Clarify BNF syntax (Notation, and when used).
  </ed:item>
  <ed:resolution datetime="2005-02-13">
    Done.
  </ed:resolution>
</ed:issue>

<ed:issue xmlns='http://www.w3.org/1999/xhtml' name="099_COPYMOVE_LOCKED_STATUS_CODE_CLARIFICATION" type="change" status="open" href="http://lists.w3.org/Archives/Public/w3c-dist-auth/2002AprJun/0079.html">
  <ed:item entered-by="ccjason@us.ibm.com" datetime="2002-05-02">
    What resource should be flagged in the multistatus response to locking issues in COPY/MOVE requests?
  </ed:item>
  <ed:resolution>
    Resolved to flag the locking errors at the source resource that was affected by the problem.
    The details of how to describe the error was deferred to a subsequent version of WebDAV. - 6/15/02 - 2518bis does not reflect this.
  </ed:resolution>
</ed:issue>

<ed:issue xmlns='http://www.w3.org/1999/xhtml' name="100_COPYMOVE_LOCKED_STATUS_DESCRIPTION" type="change" status="open" href="http://lists.w3.org/Archives/Public/w3c-dist-auth/2002AprJun/0079.html">
  <ed:item>
    The method of describing the details of (beyond what resolved by
    COPYMOVE_LOCKED_STATUS_CODE_CLARIFICATION) of the underlying cause of
    various locking and ACL  COPY/MOVE problems is deferred.  Two proposals
    were outlined in the discussion, but interest was not great and we clearly
    don't have interoperability to take these proposals forward.
  </ed:item>
</ed:issue>

<ed:issue xmlns='http://www.w3.org/1999/xhtml' name="uri_draft_ref" type="edit" status="closed">
  <ed:item entered-by="julian.reschke@greenbytes.de" date="2005-01-01">
    Fix reference to draft-fielding-uri-rfc2396bis-07.
  </ed:item>
  <ed:resolution datetime="2005-01-25">
    Update to RFC3986.
  </ed:resolution>
</ed:issue>



<section title="Introduction">
<t>
  This document describes the "locking" extension to the Web Distributed Authoring and
  Versioning (WebDAV) protocol that allows to keep more than one person from
  working on a document at the same time.  This helps preventing the "lost
  update problem," in which modifications are lost as first one author then
  another writes changes without merging the other author's changes. 
</t>

<section title="Terminology" anchor="terminology">
<t>
  The terminology used here follows and extends that in the WebDAV Distributed
  Authoring Protocol specification <xref target="RFC2518"/>.
</t>
<t>
  The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
  "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
  interpreted as described in <xref target="RFC2119"/>. 
</t>
<ed:replace ed:resolves="abnf" datetime="2005-02-13"><ed:ins>
<t>
  Since this document describes a set of extensions to the WebDAV 
  Distributed Authoring Protocol <xref target="RFC2518"/>, itself an extension to the 
  HTTP/1.1 protocol, the augmented BNF used here to describe protocol 
  elements is exactly the same as described in Section 2.1 of
  <xref target="RFC2616"/>.  Since this augmented BNF uses the basic production rules provided in 
  Section 2.2 of <xref target="RFC2616"/>, these rules apply to this document as well.
</t>
</ed:ins></ed:replace>
<t>
  This document uses XML DTD fragments 
  (<xref target="XML"/>) as a purely notational convention.
  WebDAV request and response bodies cannot be validated due to the specific
  extensibility rules defined in section 23 of <xref target="RFC2518"/> and due to the fact
  that all XML elements defined by this specification use the XML namespace
  name "DAV:".  In particular:
  <list style="symbols">
    <t>Element names use the "DAV:" namespace.</t>
    <t>Element ordering is irrelevant.</t>
    <t>Extension elements/attributes (elements/attributes not already defined
    as valid child elements) may be added anywhere, except when explicitly
    stated otherwise.</t> 
  </list>
</t>
</section>

<section title="Method Preconditions and Postconditions" anchor="method.preconditions.and.postconditions">
<t>
  A "precondition" of a method describes the state on the server that must be
  true for that method to be performed.  A "postcondition" of a method
  describes the state on the server that must be true after that method has
  completed.  If a method precondition or postcondition for a request is not
  satisfied and unless a more specific HTTP status code applies, the response status of the request MUST be either 403 (Forbidden)
  if the request should not be repeated because it will always fail, or 409
  (Conflict) if it is expected that the user might be able to resolve the
  conflict and resubmit the request.
</t>
<t>
  In order to allow better client handling of error responses, a
  distinct XML element type is associated with each method precondition and
  postcondition of a request.  When a particular precondition is not satisfied
  or a particular postcondition cannot be achieved, the appropriate XML element
  MUST be returned as the child of a top-level DAV:error element in the
  response body, unless otherwise negotiated by the request.  In a 207
  Multi-Status response, the DAV:error element would appear in the
  appropriate DAV:responsedescription element.
</t>
</section>

</section>

<section title="Overview of Locking">
<t>
   The ability to lock a resource provides a mechanism for serializing
   access to that resource.  Using a lock, an authoring client can
   provide a reasonable guarantee that another principal will not modify
   a resource while it is being edited.  In this way, a client can
   prevent the "lost update" problem.
</t>
<t>
   This specification allows locks to vary over two client-specified
   parameters, the number of principals involved (exclusive vs. shared)
   and the type of access to be granted.  This document defines locking
   for only one access type, write.  However, the syntax is extensible,
   and permits the eventual specification of locking for other access
   types.
</t>

<section title="Exclusive Vs. Shared Locks" anchor="exclusive.vs.shared.locks">
<t>
   The most basic form of lock is an exclusive lock.  This is a lock
   where the access right in question is only granted to a single
   principal.  The need for this arbitration results from a desire to
   avoid having to merge results.
</t>
<t>
   However, there are times when the goal of a lock is not to exclude
   others from exercising an access right but rather to provide a
   mechanism for principals to indicate that they intend to exercise
   their access rights.  Shared locks are provided for this case.  A
   shared lock allows multiple principals to receive a lock.  Hence any
   principal with appropriate access can get the lock.
</t>
<t>
   With shared locks there are two trust sets that affect a resource.  The
   first trust set is created by access permissions.  Principals who
   are trusted, for example, may have permission to write to the
   resource.  Among those who have access permission to write to the
   resource, the set of principals who have taken out a shared lock also
   must trust each other, creating a (typically) smaller trust set
   within the access permission write set.
</t>
<t>
   Starting with every possible principal on the Internet, in most
   situations the vast majority of these principals will not have write
   access to a given resource.  Of the small number who do have write
   access, some principals may decide to guarantee their edits are free
   from overwrite conflicts by using exclusive write locks.  Others may
   decide they trust their collaborators will not overwrite their work
   (the potential set of collaborators being the set of principals who
   have write permission) and use a shared lock, which informs their
   collaborators that a principal may be working on the resource.
</t>
<t>
   This specification does not need to provide all of the
   communications paths necessary for principals to coordinate their
   activities.  When using shared locks, principals may use any out of
   band communication channel to coordinate their work (e.g., face-to-face
   interaction, written notes, post-it notes on the screen,
   telephone conversation, Email, etc.)  The intent of a shared lock is
   to let collaborators know who else may be working on a resource.
</t>
<t>
   Shared locks are included because experience from web distributed
   authoring systems has indicated that exclusive locks are often too
   rigid.  An exclusive lock is used to enforce a particular editing
   process: take out an exclusive lock, read the resource, perform
   edits, write the resource, release the lock.  This editing process
   has the problem that locks are not always properly released, for
   example when a program crashes, or when a lock owner leaves without
   unlocking a resource.  While both timeouts and administrative action
   can be used to remove an offending lock, neither mechanism may be
   available when needed; the timeout may be long or the administrator
   may not be available.  With
   a shared lock, another user can at least take out another shared lock and
   start modifying the resource.
</t>


<section title="Lock Compatibility Table">
<texttable>
<preamble>
   The table below describes the behavior that occurs when a lock
   request is made on a resource.
</preamble>
<ttcol width="40%">Current lock state / Lock request</ttcol><ttcol>Shared Lock</ttcol><ttcol>Exclusive Lock</ttcol>
<c>None</c><c>True</c><c>True</c>
<c>Shared Lock</c><c>True</c><c>False</c>
<c>Exclusive Lock</c><c>False</c><c>False*</c>
<postamble>
   Legend: True = lock may be granted.  False = lock MUST NOT be
   granted. *=It is illegal for a principal to request the same lock
   twice.
</postamble>
</texttable>
<t>
   The current lock state of a resource is given in the leftmost column,
   and lock requests are listed in the first row.  The intersection of a
   row and column gives the result of a lock request.  For example, if a
   shared lock is held on a resource, and an exclusive lock is
   requested, the table entry is "false", indicating the lock must not
   be granted.
</t>
</section>

</section>

<section title="Required Support">
<t>
   A WebDAV compliant server is not required to support locking in any
   form.  If the server does support locking it may choose to support
   any combination of exclusive and shared locks for any access types.
</t>
<t>
   The reason for this flexibility is that locking policy strikes to the
   very heart of the resource management and versioning systems employed
   by various storage repositories.  These repositories require control
   over what sort of locking will be made available.  For example, some
   repositories only support shared write locks while others only
   provide support for exclusive write locks while yet others use no
   locking at all.  As each system is sufficiently different to merit
   exclusion of certain locking features, this specification leaves
   locking as the sole axis of negotiation within WebDAV.
</t>
</section>

<section title="Lock Tokens">
<t>
   A lock token is a type of state token, represented as a URI, which
   identifies a particular lock (see <xref target="RFC2518"/>, section 9.4, for a definition
   of state tokens).  A lock token is returned by every successful LOCK operation in the
   
   Lock-Token response header. The 
   lock token also appears in the value of the DAV:lockdiscovery property, 
   the value of which is returned in the body of the response to a 
   successful LOCK operation (note that this property also includes the tokens of 
   other current locks on the resource).
</t>
<t>
   Lock token URIs MUST be unique across all resources for all time.  This
   uniqueness constraint allows lock tokens to be submitted across
   resources and servers without fear of confusion.
</t>
<t>
   This specification provides a lock token URI scheme called
   "opaquelocktoken" that meets the uniqueness requirements.  However
   servers are free to return any URI scheme so long as it meets the
   uniqueness requirements.  
   Note that only URI schemes registered by the IETF can ensure uniqueness.
   
</t>
<t>
   Submitting a lock token provides no special access rights.  Anyone can
   find out anyone else's lock token by performing lock discovery.  Locks
   MUST be enforced based upon whatever authentication mechanism
   is used by the server, not based on the secrecy of the token values.
</t>
</section>

<section title="Lock Capability Discovery">
<t>
   Since server lock support is optional, a client trying to lock a
   resource on a server can either try the lock and hope for the best,
   or perform some form of discovery to determine what lock capabilities
   the server supports.  This is known as lock capability discovery.
   Lock capability discovery differs from discovery of supported access
   control types, since there may be access control types without
   corresponding lock types.  A client can determine what lock types the
   server supports by retrieving the DAV:supportedlock property
   defined in <xref target="PROPERTY_supportedlock"/>.
</t>

</section>


<section title="Status of a lock">
<t>
  A lock is identified by a URI (the lock token URI) but in general, it
  does not have a HTTP URL, and thus can not be directly manipulated using
  HTTP methods.  Instead, this specification defines the new methods LOCK (creating and
  refreshing locks, see <xref target="METHOD_LOCK"/>) and UNLOCK (removing locks, 
  see <xref target="METHOD_UNLOCK"/>) that act indirectly on locks.
</t>
<t>
  A lock has state that can be indirectly observed by using the DAV:lockdiscovery
  property defined in <xref target="PROPERTY_lockdiscovery"/>.  At a minimum,
  the state of a lock consists of the items defined in the sections below.  After
  lock creation, all parts of the state with the exception of the timeout value are
  immutable.
</t>

<section title="Lock Access Type">
<t>
  At present, this specification only defines one lock access type, the "write" lock
  defined in <xref target="write.lock"/>.
</t>
</section>

<section title="Lock Scope">
<t>
  A lock has either exclusive or shared scope (see <xref target="exclusive.vs.shared.locks"/>).
</t>
</section>

<section title="Lock Root" anchor="lock.root">
<t>
  A lock is created as effect of a LOCK (creation) method request.  The lock
  root is the URL to which this request was adressed.
</t>
</section>

<section title="Lock Depth" anchor="lock.depth">
<t>
  A "depth 0" lock only affects the resource to which the LOCK request was
  adressed to (the lock root).  This resource is said to be "directly locked" by the lock.
</t>
<t>
  On the other hand, a "depth infinity" lock on a collection additionally affects all members
  of that collection.  These resources are said to be "indirectly locked" by the
  lock.  A "depth infinity" lock on a non-collection resource behaves
  exactly the same way as a "depth 0" lock.
</t>
</section>

<section title="Client-supplied Lock Owner Information (optional)" ed:resolves="lock_state_auth_principal" ed:datetime="2005-02-13" ed:old-title="Lock Owner" anchor="lock.owner">
<t>
  Clients can submit information about the lock owner when creating a lock.  
  This information should be sufficient for either directly contacting a
  principal (such as a telephone number or email URI), or for discovering the
  principal (such as the URL of a homepage). 
</t>  
<t>
  Owner information is kept with the lock so that it can be returned in the DAV:lockdiscovery
  property upon request.  Note that this information is entirely client-controlled,
  thus a server MUST store the information faithfully just like if it appeared
  in a WebDAV dead property (see <xref target="RFC2518"/>, section 4).
</t>
</section>

<ed:replace ed:resolves="lock_state_auth_principal" datetime="2005-02-13"><ed:ins>
<section title="Lock Creator (optional)">
<t>
  When a lock has been created by an authenticated principal, the server
  SHOULD keep information about that principal with the lock.  This enables
  the server to subsequently check whether a lock identified by a lock token
  submitted in a request belongs to the same principal on whose behalf the lock
  was initially created (see <xref target="precondition_lock-submission-allowed"/> below).  
</t>
</section>
</ed:ins></ed:replace>

<section title="Lock Timeout" anchor="lock.timeout">
<t>
  In general, a lock expires after a certain amount of time.  This time
  can be specified in the LOCK creation request (however servers are
  not required to honor this request).
</t>  
<t>
  If the timeout expires then the lock may be lost.  Specifically, if
  the server wishes to harvest the lock upon time-out, the server
  SHOULD act as if an UNLOCK method was executed by the server on the
  resource using the lock token of the timed-out lock, performed with
  its override authority.  Thus logs should be updated with the
  disposition of the lock, notifications should be sent, etc., just as
  they would be for an UNLOCK request.
</t>
<t>
  The timers used for timeout expiry can be reset by the client by 
  submitting a LOCK refresh request.
</t>
<t>
  Servers are advised to pay close attention to the values submitted by
  clients, as they will be indicative of the type of activity the
  client intends to perform.  For example, an applet running in a
  browser may need to lock a resource, but because of the instability
  of the environment within which the applet is running, the applet may
  be turned off without warning.  As a result, the applet is likely to
  ask for a relatively small timeout value so that if the applet dies,
  the lock can be quickly harvested.  However, a document management
  system is likely to ask for an extremely long timeout because its
  user may be planning on going off-line.
</t>
<t>
  A client MUST NOT assume that just because the time-out has expired
  the lock has been lost.  Clients MUST assume that locks may arbitrarily
  disappear at any time, regardless of the value given in the Timeout header.  The
  Timeout header only indicates the behavior of the server if "extraordinary"
  circumstances do not occur.  For example, an administrator may remove a
  lock at any time or the system may crash in such a way that it loses the
  record of the lock's existence. 
</t>
</section>


</section>


<section title="Active Lock Discovery">
<t>
  If another principal locks a resource that a principal wishes to
  access, it is useful for the second principal to be able to find out
  who the first principal is.  For this purpose the DAV:lockdiscovery
  property is provided.  This property lists all outstanding locks,
  describes their type, and where available, provides their lock token.
</t>

</section>

<section title="Usage Considerations">
<t>
  Although the locking mechanisms specified here provide some help in
  preventing lost updates, they cannot guarantee that updates will
  never be lost.  Consider the following scenario:
</t>
<t>
  <list style="symbols">
    <t>
       Two clients A and B are interested in editing the resource 'index.html'.
       Client A is an HTTP client rather than a WebDAV client,
       and so does not know how to perform locking.
    </t>
    <t>
       Client A doesn't lock the document, but does a GET and begins
       editing.
    </t>
    <t>
       Client B does LOCK, performs a GET and begins editing.
    </t>
    <t>
       Client B finishes editing, performs a PUT, then an UNLOCK.
    </t>
    <t>
       Client A performs a PUT, overwriting and losing all of B's changes.
    </t>
  </list>
</t>
<t>
  There are several reasons why the WebDAV protocol itself cannot
  prevent this situation.  First, it cannot force all clients to use
  locking because it must be compatible with HTTP clients that do not
  comprehend locking.  Second, it cannot require servers to support
  locking because of the variety of repository implementations, some of
  which rely on reservations and merging rather than on locking.
  Finally, being stateless, it cannot enforce a sequence of operations
  like LOCK / GET / PUT / UNLOCK.
</t>
<t>
  WebDAV servers that support locking can reduce the likelihood that
  clients will accidentally overwrite each other's changes by requiring
  clients to lock resources before modifying them.  Such servers would
  effectively prevent HTTP 1.0 and HTTP 1.1 clients from modifying
  resources.
</t>
<t>
  WebDAV clients can be good citizens by using a lock / retrieve /
  write /unlock sequence of operations (at least by default) whenever
  they interact with a WebDAV server that supports locking.
</t>
<t>
  HTTP 1.1 clients can be good citizens, avoiding overwriting other
  clients' changes, by using entity tags in If-Match headers with any
  requests that would modify resources.
</t>
<t>
  Information managers may attempt to prevent overwrites by
  implementing client-side procedures requiring locking before
  modifying WebDAV resources.
</t>
</section>
</section>


<section title="Write Lock" anchor="write.lock">
<t>
  This section describes the semantics specific to the write lock type. The
  write lock is a specific instance of a lock type, and is the only lock type
  described in this specification. 
</t>

<section title="Methods Restricted by Write Locks">
<t>
  If a request would modify the content for a locked resource, a dead property
  of a locked resource, a live property that is defined to be lockable for a
  locked resource, or an internal member URI of a locked collection, the request
  MUST fail unless the lock-token for that lock is submitted in the request.  An
  internal member URI of a collection is considered to be modified if it is
  added, removed, or identifies a different resource. 
  <cref source="reschke">Copy of GULP, "Locked State".</cref>
</t>
</section>

<section title="Write Locks and Properties">
<t>
   While those without a write lock may not alter a property on a
   resource it is still possible for the values of live properties to
   change, even while locked, due to the requirements of their schemas.
   Only dead properties and live properties defined to respect locks are
   guaranteed not to change while write locked.
</t>
</section>

<section title="Write Locks and Collections" anchor="write.locks.and.collections">
<t>
   A write lock on a collection, whether created by a "Depth: 0" or
   "Depth: infinity" lock request, prevents the addition or removal of
   member URIs of the collection by non-lock owners.  As a consequence,
   when a principal issues a PUT or POST request to create a new
   resource under a URI which needs to be an internal member of a write
   locked collection to maintain HTTP namespace consistency, or issues a
   DELETE to remove an
   internal member URI of a write locked collection, this request MUST
   fail if the principal does not have a write lock on the collection.
</t>
<t>
   However, if a write lock request is issued to a collection containing
   member URIs identifying resources that are currently locked in a
   manner which conflicts with the write lock, the request MUST fail
   with a 423 (Locked) status code (Note that this can only
   occur for a request of a "Depth: infinity" write lock).
</t>
<t>
   If a lock owner causes the URI of a resource to be added as an
   internal member URI of a "Depth: infinity"  locked collection then the new resource MUST
   be automatically added to the lock.  This is the only mechanism that
   allows a resource to be added to a write lock.  Thus, for example, if
   the collection /a/b/ is write locked and the resource /c is moved to
   /a/b/c then resource /a/b/c will be added to the write lock.
</t>
</section>



<section title="Write Locks and the If Request Header" anchor="write.locks.and.the.if.request.header">
<t>
  If a user agent is not required to have knowledge about a lock when
  requesting an operation on a locked resource, the following scenario
  might occur.  Program A, run by User A, takes out a write lock on a
  resource.  Program B, also run by User A, has no knowledge of the
  lock taken out by Program A, yet performs a PUT to the locked
  resource.  In this scenario, the PUT succeeds because locks are
  associated with a principal, not a program, and thus program B,
  because it is acting with principal A's credential, is allowed to
  perform the PUT.  However, had program B known about the lock, it
  would not have overwritten the resource, preferring instead to
  present a dialog box describing the conflict to the user.  Due to
  this scenario, a mechanism is needed to prevent different programs
  from accidentally ignoring locks taken out by other programs with the
  same authorization.
</t>
<t>
  In order to prevent these collisions a lock token MUST be submitted
  in the If header for all locked resources
  that a method may interact with or the method MUST fail.  For
  example, if a resource is to be moved and both the source and
  destination are locked then two lock tokens must be submitted, one
  for the source and the other for the destination.
</t>
<t>
  Servers SHOULD restrict usage of the lock token to exactly the
  authenticated principal who created the lock.
</t>

<section title="Example - Write Lock">
<figure><preamble>
   &gt;&gt;Request</preamble>

<artwork>
   COPY /~fielding/index.html HTTP/1.1
   Host: example.com
   Destination: http://example.com/users/f/fielding/index.html
   If: &lt;http://example.com/users/f/fielding/index.html&gt;
       (&lt;opaquelocktoken:f81d4fae-7dec-11d0-a765-00a0c91e6bf6&gt;)
</artwork>

</figure>
<figure><preamble>
   &gt;&gt;Response</preamble>
<artwork>
   HTTP/1.1 204 No Content
</artwork></figure>
<t>
  In this example, even though both the source and destination are
  locked, only one lock token must be submitted, for the lock on the
  destination.  This is because the source resource is not modified by
  a COPY, and hence unaffected by the write lock. In this example, user
  agent authentication has previously occurred via a mechanism outside
  the scope of the HTTP protocol, in the underlying transport layer.
</t>
</section>
</section>

<section title="Write Locks and COPY/MOVE">
<t>
  A COPY method invocation MUST NOT duplicate any write locks active on
  the source.  However, as previously noted, if the COPY copies the
  resource into a collection that is locked with "Depth: infinity",
  then the resource will be added to the lock.
</t>
<t>
  A successful MOVE request on a write locked resource MUST NOT move
  the write lock with the resource. However, the resource is subject to
  being added to an existing lock at the destination, as specified in
  <xref target="write.locks.and.collections"/>. For example, if the MOVE makes the resource a child of a
  collection that is locked with "Depth: infinity", then the resource
  will be added to that collection's lock. Additionally, if a resource
  locked with "Depth: infinity" is moved to a destination that is
  within the scope of the same lock (e.g., within the namespace tree
  covered by the lock), the moved resource will again be a added to the
  lock. In both these examples, as specified in <xref target="write.locks.and.the.if.request.header"/>, an If
  header must be submitted containing a lock token for both the source
  and destination.
</t>
</section>

</section>



<section title="Properties" anchor="properties">
<t>
  
  Any DAV compliant resource that supports the LOCK method MUST support
  the DAV:activelock and DAV:lockdiscovery properties defined below.
  
</t>
<section title="Common XML elements used in property values">
<section title="Lock Scopes">
<figure>
<artwork>
   &lt;!ELEMENT lockscope (exclusive | shared) &gt;
   &lt;!ELEMENT exclusive EMPTY &gt;
   &lt;!ELEMENT shared EMPTY &gt;
</artwork>
</figure>
</section>

<section title="Lock Types">
<figure>
<artwork>
   &lt;!ELEMENT locktype (write) &gt;
   &lt;!ELEMENT write EMPTY &gt;
</artwork>
</figure>

</section>
</section>

<section title="DAV:lockdiscovery property" anchor="PROPERTY_lockdiscovery">
<iref item="DAV:lockdiscovery property" primary="true"/>
<iref item="Properties" subitem="DAV:lockdiscovery" primary="true"/>
<t>
  The DAV:lockdiscovery property returns a listing of who has
  a lock, what type of lock he has, the timeout type, the time
  remaining on the timeout, the associated lock token and the root of the lock.  The 
  server is free to withhold any or all of this information if the requesting
  principal does not have sufficient access rights to see the requested
  data.
</t>
<figure><artwork>
   &lt;!ELEMENT lockdiscovery (activelock)* &gt;
</artwork></figure>
<figure><artwork>
   &lt;!ELEMENT activelock (lockscope, locktype, depth, owner?,
                         timeout?, locktoken?, lockroot) &gt;
</artwork></figure>

<figure>
<preamble>
depth: the value of the Depth header (see <xref target="lock.depth"/>; takes
the values "0" or "infinity").
</preamble>
<artwork>
   &lt;!ELEMENT depth (#PCDATA) &gt;
</artwork></figure>
<figure>
<preamble>
owner: provides information about the principal taking out a lock (see <xref target="lock.owner"/>).
</preamble>
<artwork>
   &lt;!ELEMENT owner ANY&gt;
</artwork></figure>
<figure>
<preamble>
timeout: 
the time remaining until timeout of a lock (see <xref target="lock.timeout"/>).
</preamble>
<artwork>
   &lt;!ELEMENT timeout (#PCDATA) &gt;
</artwork></figure>
<figure>
<preamble>
locktoken: the lock token associated with a lock; the href element contains
the lock token.
</preamble>
<artwork>
   &lt;!ELEMENT locktoken (href) &gt;
</artwork></figure>
<figure>
<preamble>
lockroot: the URL that was specified as Request-URI in the LOCK creation request; the 
href element contains the URL(see <xref target="lock.root"/>).
</preamble>
<artwork>
   &lt;!ELEMENT lockroot (href) &gt;
</artwork></figure>
<figure>
<preamble>
href: defined in <xref target="RFC2518"/>, section 12.3.
</preamble>
<artwork>
   &lt;!ELEMENT lockroot (href) &gt;
</artwork></figure>

<section title="Examples for the DAV:lockdiscovery">
<figure>
  <preamble>
  DAV:lockdiscovery property for a resource that has two shared write locks on
  it, with infinite timeouts:  
  </preamble>
<artwork>
   &lt;D:lockdiscovery xmlns:D="DAV:"&gt;
     &lt;D:activelock&gt;
       &lt;D:locktype&gt;&lt;D:write/&gt;&lt;/D:locktype&gt;
       &lt;D:lockscope&gt;&lt;D:shared/&gt;&lt;/D:lockscope&gt;
       &lt;D:depth&gt;0&lt;/D:depth&gt;
       &lt;D:owner&gt;Jane Smith&lt;/D:owner&gt;
       &lt;D:timeout&gt;Infinite&lt;/D:timeout&gt;
       &lt;D:locktoken&gt;
         &lt;D:href
   &gt;opaquelocktoken:f81de2ad-7f3d-a1b2-4f3c-00a0c91a9d76&lt;/D:href&gt;
       &lt;/D:locktoken&gt;
       &lt;D:lockroot&gt;
         &lt;D:href
   &gt;http://example.com/container/&lt;/D:href&gt;
       &lt;/D:lockroot&gt;
     &lt;/D:activelock&gt;&gt;
     &lt;D:activelock&gt;
       &lt;D:locktype&gt;&lt;D:write/&gt;&lt;/D:locktype&gt;
       &lt;D:lockscope&gt;&lt;D:shared/&gt;&lt;/D:lockscope&gt;
       &lt;D:depth&gt;0&lt;/D:depth&gt;
       &lt;D:owner&gt;John Doe&lt;/D:owner&gt;
       &lt;D:timeout&gt;Infinite&lt;/D:timeout&gt;
       &lt;D:locktoken&gt;
         &lt;D:href
   &gt;opaquelocktoken:f81de2ad-7f3d-a1b2-4f3c-00a0c91a9d77&lt;/D:href&gt;
       &lt;/D:locktoken&gt;
       &lt;D:lockroot&gt;
         &lt;D:href
   &gt;http://example.com/container/&lt;/D:href&gt;
       &lt;/D:lockroot&gt;
     &lt;/D:activelock&gt;
   &lt;/D:lockdiscovery&gt;
</artwork>
</figure>
<figure>
  <preamble>
  DAV:lockdiscovery property for a resource with no locks on it:  
  </preamble>
<artwork>
   &lt;D:lockdiscovery xmlns:D="DAV:"/&gt;
</artwork>
</figure>
</section>
</section>

<section title="DAV:supportedlock property" anchor="PROPERTY_supportedlock">
<iref item="DAV:supportedlock property" primary="true"/>
<iref item="Properties" subitem="DAV:supportedlock" primary="true"/>
<t>
  The DAV:supportedlock property of a resource returns a
  listing of the combinations of scope and access types which may be
  specified in a lock request on the resource.  Note that the actual
  contents are themselves controlled by access controls so a server is
  not required to provide information the client is not authorized to
  see.
</t>
<figure><artwork>
   &lt;!ELEMENT supportedlock (lockentry)* &gt;
   &lt;!ELEMENT lockentry (lockscope, locktype) &gt;
</artwork></figure>

<section title="Examples for the DAV:supportedlock property">
<figure>
<preamble>
  DAV:supportedlock property for a resource that supports both exclusive
  and shares write locks:
</preamble>
<artwork>
   &lt;D:supportedlock xmlns:D="DAV:"&gt;
     &lt;D:lockentry&gt;
       &lt;D:lockscope&gt;&lt;D:exclusive/&gt;&lt;/D:lockscope&gt;
       &lt;D:locktype&gt;&lt;D:write/&gt;&lt;/D:locktype&gt;
     &lt;/D:lockentry&gt;
     &lt;D:lockentry&gt;
       &lt;D:lockscope&gt;&lt;D:shared/&gt;&lt;/D:lockscope&gt;
       &lt;D:locktype&gt;&lt;D:write/&gt;&lt;/D:locktype&gt;
     &lt;/D:lockentry&gt;
   &lt;/D:supportedlock&gt;
</artwork>
</figure>
<figure>
<preamble>
  DAV:supportedlock property for a resource that doesn't support any locks
  at all:
</preamble>
<artwork>
   &lt;D:supportedlock xmlns:D="DAV:"/&gt;
</artwork>
</figure>
</section>
</section>
</section>

<section title="LOCK Method" anchor="METHOD_LOCK">
<iref item="LOCK method" primary="true"/>
<iref item="Methods" subitem="LOCK" primary="true"/>
<t>
   The following sections describe the LOCK method, which is used to
   take out a lock of any access type or to refresh an existing lock.
</t>

<section title="Creating Locks">
<iref item="LOCK method" subitem="lock creation" primary="true"/>
<iref item="Methods" subitem="LOCK (lock creation)" primary="true"/>
<t>
  A LOCK method invocation with non-empty request body creates the lock
  specified by the lockinfo XML element on the resource identified by the
  Request-URI.  If the Request-URI identifies a null resource, the invocation
  MUST create a new resource with empty content.
</t>

<section title="Marshalling">
<t>
  The request MAY include a "Timeout" header to be used as the timeout value
  for the lock to be created (see <xref target="HEADER_timeout"/>).  However,
  the server is not required to honor or even consider this request.
</t>
<t>
  The request MAY include a "Depth" header specifying either "0" or "infinity"
  (see <xref target="RFC2518"/>, section 9.2).  If no "Depth" header is submitted 
  then the request MUST act as if a "Depth:infinity" had been specified. 
</t>
<t>
  The request body MUST be a DAV:lockinfo element:
  <figure><artwork>
  &lt;!ELEMENT lockinfo (lockscope, locktype, owner?) &gt;
</artwork></figure>
</t>
<t>
  DAV:lockscope, DAV:locktype and DAV:owner are defined in <xref target="properties"/>.
</t>
<t>
  The response body for a successful request MUST be a DAV:prop XML element,
  containing the new value for the DAV:lockdiscovery property
  defined in <xref target="PROPERTY_lockdiscovery"/>.    The lock token URI for the new 
  lock MUST be returned in the "Lock-Token" response header (see <xref target="HEADER_lock-token"/>).
</t>
<t>
  <cref source="reschke">Add preconditions for the validy of various parts
  of the request body?</cref>
</t>
</section>

<section title="Postconditions">

<section title="DAV:create-lock postcondition">
<iref item="Condition Names" subitem="DAV:create-lock (post)" primary="true"/>
<iref item="DAV:create-lock postcondition" primary="true"/>
<t>
  The request MUST have created a new lock on the 
  resource identified by the Request-URI.  The request MUST have allocated
  a distinct new lock token URI for the new lock, and that URI MUST NOT ever
  identify anything other than that lock.
  <cref source="reschke">Say what parts of the request lock criteria
  must be followed.</cref>
</t>
</section>

<section title="DAV:create-resource postcondition">
<iref item="Condition Names" subitem="DAV:create-resource (post)" primary="true"/>
<iref item="DAV:create-resource postcondition" primary="true"/>
<t>
  If the Request-URI identified a null resource, the method MUST have
  created a new resource with empty content.
</t>
</section>
</section>


<section title="Example - Simple Lock Request">
<figure><preamble>
   &gt;&gt;Request</preamble>
<artwork>
   LOCK /workspace/webdav/proposal.doc HTTP/1.1
   Host: example.com
   Timeout: Infinite, Second-4100000000
   Content-Type: text/xml; charset="utf-8"
   Content-Length: xxxx
   Authorization: Digest username="ejw",
      realm="ejw@example.com", nonce="...",
      uri="/workspace/webdav/proposal.doc",
      response="...", opaque="..."

   &lt;?xml version="1.0" encoding="utf-8" ?&gt;
   &lt;D:lockinfo xmlns:D='DAV:'&gt;
     &lt;D:lockscope&gt;&lt;D:exclusive/&gt;&lt;/D:lockscope&gt;
     &lt;D:locktype&gt;&lt;D:write/&gt;&lt;/D:locktype&gt;
     &lt;D:owner&gt;
       &lt;D:href&gt;http://example.org/~ejw/contact.html&lt;/D:href&gt;
     &lt;/D:owner&gt;
   &lt;/D:lockinfo&gt;
</artwork>
</figure>
<figure><preamble>
   &gt;&gt;Response</preamble>
<artwork>
   HTTP/1.1 200 OK
   Lock-Token: &lt;opaquelocktoken:e71d4fae-5dec-22d6-fea5-00a0c91e6be4&gt;
   Content-Type: text/xml; charset="utf-8"
   Content-Length: xxxx

   &lt;?xml version="1.0" encoding="utf-8" ?&gt;
   &lt;D:prop xmlns:D="DAV:"&gt;
     &lt;D:lockdiscovery&gt;
       &lt;D:activelock&gt;
         &lt;D:locktype&gt;&lt;D:write/&gt;&lt;/D:locktype&gt;
         &lt;D:lockscope&gt;&lt;D:exclusive/&gt;&lt;/D:lockscope&gt;
         &lt;D:depth&gt;Infinity&lt;/D:depth&gt;
         &lt;D:owner&gt;
           &lt;D:href
   &gt;http://example.org/~ejw/contact.html&lt;/D:href&gt;
         &lt;/D:owner&gt;
         &lt;D:timeout&gt;Second-604800&lt;/D:timeout&gt;
         &lt;D:locktoken&gt;
           &lt;D:href
   &gt;opaquelocktoken:e71d4fae-5dec-22d6-fea5-00a0c91e6be4&lt;/D:href&gt;
         &lt;/D:locktoken&gt;
         &lt;D:lockroot&gt;
           &lt;D:href
   &gt;http://example.com/workspace/webdav/proposal.doc&lt;/D:href&gt;
         &lt;/D:lockroot&gt;
       &lt;/D:activelock&gt;
     &lt;/D:lockdiscovery&gt;
   &lt;/D:prop&gt;
</artwork>
</figure>
<t>
   This example shows the successful creation of an exclusive write lock
   on resource http://example.com/workspace/webdav/proposal.doc.  The resource 
   http:/example.org/~ejw/contact.html contains contact information for the
   owner of the lock.  The server has an activity-based timeout policy in
   place on this resource, which causes the lock to automatically be removed
   after 1 week (604800 seconds).
</t>
</section>

<section title="Example - Multi-Resource Lock Request">
<figure><preamble>
   &gt;&gt;Request</preamble>
<artwork>
   LOCK /webdav/ HTTP/1.1
   Host: example.com
   Timeout: Infinite, Second-4100000000
   Depth: infinity
   Content-Type: text/xml; charset="utf-8"
   Content-Length: xxxx
   Authorization: Digest username="ejw",
      realm="ejw@example.com", nonce="...",
      uri="/workspace/webdav/proposal.doc",
      response="...", opaque="..."

   &lt;?xml version="1.0" encoding="utf-8" ?&gt;
   &lt;D:lockinfo xmlns:D="DAV:"&gt;
     &lt;D:locktype&gt;&lt;D:write/&gt;&lt;/D:locktype&gt;
     &lt;D:lockscope&gt;&lt;D:exclusive/&gt;&lt;/D:lockscope&gt;
     &lt;D:owner&gt;
       &lt;D:href&gt;http://example.org/~ejw/contact.html&lt;/D:href&gt;
     &lt;/D:owner&gt;
   &lt;/D:lockinfo&gt;
</artwork>
</figure>
<figure><preamble>
   &gt;&gt;Response</preamble>
<artwork>
   HTTP/1.1 207 Multi-Status
   Content-Type: text/xml; charset="utf-8"
   Content-Length: xxxx

   &lt;?xml version="1.0" encoding="utf-8" ?&gt;
   &lt;D:multistatus xmlns:D="DAV:"&gt;
     &lt;D:response&gt;
        &lt;D:href&gt;/webdav/secret&lt;/D:href&gt;
        &lt;D:status&gt;HTTP/1.1 403 Forbidden&lt;/D:status&gt;
     &lt;/D:response&gt;
     &lt;D:response&gt;
        &lt;D:href&gt;/webdav/&lt;/D:href&gt;
        &lt;D:status&gt;HTTP/1.1 424 Failed Dependency&lt;/D:status&gt;
     &lt;/D:response&gt;
   &lt;/D:multistatus&gt;
</artwork>

</figure>
<t>
   This example shows a request for an exclusive write lock on a
   collection and all its children.  In this request, the client has
   specified that it desires an infinite length lock, if available,
   otherwise a timeout of 4.1 billion seconds, if available.  The request
   entity body contains the contact information for the principal taking
   out the lock, in this case a web page URL.
</t>
<t>
   The error is a 403 (Forbidden) response on the resource
   http://example.com/webdav/secret.  Because this resource could
   not be locked, none of the resources were locked.
</t>
</section>
</section>

<section title="Refreshing Locks" anchor="METHOD_LOCK_refresh">
<iref item="LOCK method" subitem="lock refresh" primary="true"/>
<iref item="Methods" subitem="LOCK (lock refresh)" primary="true"/>
<t>
  A LOCK request with no request body is a "LOCK refresh" request.  It's 
  purpose is to restart all timers associated with a lock.
</t>
<t>
  If an error is received in response to a refresh LOCK request the
  client SHOULD assume that the lock was not refreshed.
  <cref source="reschke">This fact is so obvious that it should be removed.</cref>
</t>


<section title="Marshalling">

<t>
  The request MUST include an "If" header that contains the lock tokens
  of the locks to be refreshed (note there may be multiple in the case
  of shared locks).
</t>
<t>
  The request MAY include a "Timeout" header to be used as the new
  timeout value for the lock(s) to be refreshed 
  (see <xref target="HEADER_timeout"/>).
</t>

<t>
  The request MAY include a "Depth" header specifying either "0" or "infinity"
  (see <xref target="RFC2518"/>, section 9.2) which MUST be ignored when present.
</t>

<t>
  The response to a successful lock refresh request MUST contain the value of
  the current DAV:lockdiscovery property in a prop XML element. 
</t>
</section>

<section title="Preconditions">
<section title="DAV:lock-submission-allowed precondition">
<iref item="Condition Names" subitem="DAV:lock-submission-allowed (pre)"/>
<iref item="DAV:lock-submission-allowed precondition"/>
<t>
  See <xref target="precondition_lock-submission-allowed"/>.
</t>
</section>
</section>

<section title="Postconditions">
<section title="DAV:locks-refreshed postcondition">
<iref item="Condition Names" subitem="DAV:locks-refreshed (post)" primary="true"/>
<iref item="DAV:locks-refreshed postcondition" primary="true"/>
<t>
  Timers associated with the those locks submitted in the "If" request
  header whose lock root is the resource identified by the Request-URI
  MUST be reset to their original value (or alternatively to the new
  value given in the "Timeout" request header).
</t>
</section>
</section>



<section title="Example - Refreshing a Write Lock">
<figure><preamble>
   &gt;&gt;Request</preamble>
<artwork>
   LOCK /workspace/webdav/proposal.doc HTTP/1.1
   Host: example.com
   Timeout: Infinite, Second-4100000000
   If: (&lt;opaquelocktoken:e71d4fae-5dec-22d6-fea5-00a0c91e6be4&gt;)
   Authorization: Digest username="ejw",
      realm="ejw@example.com", nonce="...",
      uri="/workspace/webdav/proposal.doc",
      response="...", opaque="..."
</artwork>
</figure>
<figure><preamble>
   &gt;&gt;Response</preamble>
<artwork>
   HTTP/1.1 200 OK
   Content-Type: text/xml; charset="utf-8"
   Content-Length: xxxx

   &lt;?xml version="1.0" encoding="utf-8" ?&gt;
   &lt;D:prop xmlns:D="DAV:"&gt;
     &lt;D:lockdiscovery&gt;
       &lt;D:activelock&gt;
         &lt;D:locktype&gt;&lt;D:write/&gt;&lt;/D:locktype&gt;
         &lt;D:lockscope&gt;&lt;D:exclusive/&gt;&lt;/D:lockscope&gt;
         &lt;D:depth&gt;Infinity&lt;/D:depth&gt;
         &lt;D:owner&gt;
           &lt;D:href
   &gt;http://example.org/~ejw/contact.html&lt;/D:href&gt;
         &lt;/D:owner&gt;
         &lt;D:timeout&gt;Second-604800&lt;/D:timeout&gt;
         &lt;D:locktoken&gt;
           &lt;D:href
   &gt;opaquelocktoken:e71d4fae-5dec-22d6-fea5-00a0c91e6be4&lt;/D:href&gt;
         &lt;/D:locktoken&gt;
         &lt;D:lockroot&gt;
           &lt;D:href
   &gt;http://example.com/workspace/webdav/proposal.doc&lt;/D:href&gt;
         &lt;/D:lockroot&gt;
       &lt;/D:activelock&gt;
     &lt;/D:lockdiscovery&gt;
   &lt;/D:prop&gt;
</artwork>
</figure>
<t>
   This request would refresh the lock, resetting any time outs.  Notice
   that the client asked for an infinite time out but the server choose
   to ignore the request.
</t>
</section>
</section>

</section>

<section title="UNLOCK Method" anchor="METHOD_UNLOCK">
<iref item="UNLOCK method" primary="true"/>
<iref item="Methods" subitem="UNLOCK" primary="true"/>
<t>
   The UNLOCK method removes the lock identified by the lock token in
   the Lock-Token request header from the resource identified by the Request-URI, and all other
   resources included in the lock.  Note that the UNLOCK request may be submitted to
   any resource locked by that lock (even those that are locked indirectly).
</t>
<t>
   If all resources which have been locked under the submitted lock token can
   not be unlocked then the UNLOCK request MUST fail.
</t>
<t>
   Any DAV compliant resource which supports the LOCK method MUST
   support the UNLOCK method.
</t>
<t>
  A server MAY allow principals other than a lock owner to unlock a
  resource.  In this case, this capability SHOULD be under access control (see
  <xref target="RFC3744"/>, section 3.5).  Note that there is a tradeoff in allowing non-owners of a lock to unlock a
  resource.  It can be beneficial to allow non-lock owners to perform UNLOCK
  requests because it allows the adminstrator of the server to configure the
  server to grant longer lock timeouts because the administrator knows that
  there is a process in place to allow users to deal with forgotten locks
  left by other users.  On the other hand, a disadvantage of unlocking
  someone else's lock is that can create a situation where two users are
  working on modifications to the same resource at the same time which can
  result in a client having to perform an merge that wasn't previously
  planned.
</t>

<section title="Marshalling">
<t>
  The request MUST include a "Lock-Token" header (see <xref target="HEADER_lock-token"/>) that identifies the lock
  to be removed.
</t>
<t>
  <cref source="reschke">Specify optional request body?</cref>
</t>
</section>

<section title="Preconditions">

<section title="DAV:lock-token-matches precondition">
<iref item="Condition Names" subitem="DAV:lock-token-matches (pre)" primary="true"/>
<iref item="DAV:lock-token-matches precondition" primary="true"/>
<t>
  The lock identified by the "Lock-Token" request header exists, and the
  resource identified by the Request-URI indeed is directly locked by
  the specified lock.
</t>
</section>

<section title="DAV:lock-removal-allowed precondition">
<iref item="Condition Names" subitem="DAV:lock-removal-allowed (pre)" primary="true"/>
<iref item="DAV:lock-removal-allowed precondition" primary="true"/>
<t>
  As dicussed above, the principal authenticated for the UNLOCK request MUST be allowed
  to remove the identified lock (note that servers that
  support the "WebDAV Access Control Protocol" should use the DAV:need-privileges
  precondition defined in section 7.1.1 of <xref target="RFC3744"/>).
</t>
</section>

</section>

<section title="Postconditions">
<section title="DAV:lock-removed postcondition">
<iref item="Condition Names" subitem="DAV:lock-removed (post)" primary="true"/>
<iref item="DAV:lock-removed postcondition" primary="true"/>
<t>
  The lock MUST have been removed from all resources included in the lock.
</t>
</section>

</section>



<section title="Example - UNLOCK">
<figure><preamble>
   &gt;&gt;Request</preamble>
<artwork>
   UNLOCK /workspace/webdav/info.doc HTTP/1.1
   Host: example.com
   Lock-Token: &lt;opaquelocktoken:a515cfa4-5da4-22e1-f5b5-00a0451e6bf7&gt;
   Authorization: Digest username="ejw",
      realm="ejw@example.com", nonce="...",
      uri="/workspace/webdav/proposal.doc",
      response="...", opaque="..."
</artwork>
</figure>
<figure><preamble>
   &gt;&gt;Response</preamble>
<artwork>
   HTTP/1.1 204 No Content
</artwork></figure>
<t>
   In this example, the lock identified by the lock token
   "opaquelocktoken:a515cfa4-5da4-22e1-f5b5-00a0451e6bf7" is
   successfully removed from the resource
   http://example.com/workspace/webdav/info.doc.  If this lock
   included more than just one resource, the lock is removed from all
   resources included in the lock.  
   Note that clients MUST interpret any of the success status codes defined
   in <xref target="RFC2616"/>, section 10.2 as success codes.  204 (No Content) was used
   here merely for consistency with the example in <xref target="RFC2518"/>,
   section 8.11.1).
   
</t>
</section>

</section>

<section title="Additional status codes">

<section title="423 Locked" anchor="STATUS_423">
<iref item="423 Locked (status code)" primary="true"/>
<iref item="Status Codes" subitem="423 Locked" primary="true"/>
<t>
   The 423 (Locked) status code means the source or destination resource
   of a method is locked.
</t>
</section>

</section>


<section title="Additional marshalling and method semantics for other methods">
<section title="Additional marshalling" anchor="additional.marshalling">
<t>
  This section defines additional condition names (see <xref target="method.preconditions.and.postconditions"/>) that
  apply to all methods.
</t>


<section title="DAV:name-allowed precondition">
<iref item="Condition Names" subitem="DAV:name-allowed (pre)" primary="true"/>
<iref item="DAV:name-allowed precondition" primary="true"/>
<t>
  If a request such as COPY, LOCK, MOVE, PUT or MKCOL is going to 
  create a new internal member URI inside a collection resource, the last
  path segment of that URI must specify a name that is available as a resource name
  (for instance, servers may disallow path segments that -- after being URI-unescaped -- 
  aren't valid UTF-8 octet sequences).
  <cref source="reschke">Copied from draft-ietf-webdav-redirectref-protocol.</cref>
</t>
</section>

<section title="DAV:parent-resource-must-be-non-null precondition">
<iref item="Condition Names" subitem="DAV:parent-resource-must-be-non-null (pre)" primary="true"/>
<iref item="DAV:parent-resource-must-be-non-null precondition" primary="true"/>
<t>
  If a request such as COPY, LOCK, MOVE, PUT or MKCOL is going to 
  create a new internal member URI inside a collection resource, that
  collection resource must be non-null.
  <cref source="reschke">Copied from draft-ietf-webdav-redirectref-protocol.</cref>
</t>
</section>


</section>
<section title="Additional method semantics">


<t>
  This section defines names (see <xref target="method.preconditions.and.postconditions"/>) for new
  conditions introduced by locking semantics.  Otherwise noted otherwise, they apply
  to all methods.
</t>
<section title="DAV:lock-token-submission-allowed precondition" anchor="precondition_lock-submission-allowed">
  <iref item="Condition Names" subitem="DAV:lock-token-submission-allowed (pre)" primary="true"/>
  <iref item="DAV:lock-token-submission-allowed precondition" primary="true"/>
  <t>
  If the server restricts usage of the lock token inside an "If" request
  header to specific principals, the authenticated principal for this
  request MUST be one of them.
  </t>
</section>

<section title="DAV:need-lock-token precondition">
<t>
  <iref item="Condition Names" subitem="DAV:need-lock-token (pre)" primary="true"/>
  <iref item="DAV:need-lock-token precondition" primary="true"/>
  If a request would modify the content
  for a locked resource, a dead property of a locked resource, a live
  property that is defined to be lockable for a locked resource, or an
  internal member URI of a locked collection, the request MUST fail
  unless the lock-token for that lock is submitted in the request.  An
  internal member URI of a collection is considered to be modified if it
  is added, removed, or identifies a different resource.
  <cref source="reschke">Copied from GULP.</cref>
</t>
<figure><artwork>
   &lt;!ELEMENT need-lock-token (href)* &gt;</artwork></figure>
<t>
  Servers SHOULD insert DAV:href elements for the URLs of each root of a
  lock for which a lock token was needed, unless that URL identies the
  same resource to that the request was sent.
</t>
<section title="Example">
<t>
  In the example below, a client unaware of a "Depth: infinity" lock on
  the parent collection "/workspace/webdav/" attempts to modify the
  collection member "/workspace/webdav/proposal.doc".
</t>
<figure><preamble>
   &gt;&gt;Request</preamble>
<artwork>
   PUT /workspace/webdav/proposal.doc HTTP/1.1
   Host: example.com
</artwork>
</figure>
<figure><preamble>
   &gt;&gt;Response</preamble>
<artwork>
   HTTP/1.1 423 Locked
   Content-Type: text/xml; charset="utf-8"
   Content-Length: xxxx

   &lt;?xml version="1.0" encoding="utf-8" ?&gt;
   &lt;D:error xmlns:D="DAV:"&gt;
     &lt;D:need-lock-token&gt;
       &lt;D:href&gt;/workspace/webdav/&lt;/D:href&gt;
     &lt;/D:need-lock-token&gt;
   &lt;/D:error&gt;
</artwork></figure>
</section>
</section>


</section>
</section>



<section title="Headers" anchor="headers">
<section title="Lock-Token request/response header" anchor="HEADER_lock-token">
<iref item="Lock-Token header" primary="true"/>
<iref item="Headers" subitem="Lock-Token" primary="true"/>
<ed:replace ed:resolves="edit" datetime="2005-02-06"><ed:del>
<figure><artwork>
   Lock-Token = "Lock-Token" ":" Coded-URL
</artwork></figure>
<t>
  Note that the "Coded-URL" production is defined in <xref target="RFC2518"/>, section 9.4.
</t>
</ed:del><ed:ins>
<figure><artwork type="abnf">
   Lock-Token = "Lock-Token" ":" Coded-URL
   ; Coded-URL: see <xref target="RFC2518"/>, Section 9.4.
</artwork></figure>
</ed:ins></ed:replace>
<t>
  The Lock-Token request header is used with the UNLOCK method to
  identify the lock to be removed.  The lock token in the Lock-Token
  request header MUST identify a lock that contains the resource
  identified by Request-URI as a member.
</t>
<t>
  The Lock-Token response header is used with the LOCK method to
  indicate the lock token created as a result of a successful LOCK
  request to create a new lock.
</t>
<t>
  Note that the "Lock-Token" request header does not contribute to the precondition
  checks defined for the HTTP status 412 (see <xref target="RFC2616"/>, section 10.4.13).
</t>
</section>


<section title="Timeout request header" anchor="HEADER_timeout">
<iref item="Timeout header" primary="true"/>
<iref item="Headers" subitem="Timeout" primary="true"/>
<ed:replace ed:resolves="abnf" datetime="2005-02-13"><ed:del>
<figure>
<artwork>
   TimeOut = "Timeout" ":" 1#TimeType
   TimeType = ("Second-" DAVTimeOutVal | "Infinite" | Other)
   DAVTimeOutVal = 1*digit
   Other = "Extend" field-value   ; See section 4.2 of <xref target="RFC2616"/>
</artwork>
</figure>
</ed:del><ed:ins>
<figure><artwork>
   TimeOut       = "Timeout" ":" 1#TimeType
   TimeType      = (TimeTypeSec | "Infinite" | Other)
   TypeTypeSec   = "Second-" 1*digit
   Other         = "Extend" field-value
   ; field-value: see <xref target="RFC2616"/>, Section 4.2
</artwork>
<postamble>(Linear white space (LWS) MUST NOT be used inside "TimeTypeSec".)</postamble>
</figure>   
</ed:ins></ed:replace>
<t>
  Clients MUST NOT submit a Timeout request header with any method
  other than a LOCK method.
</t>
<t>
   A Timeout request header MUST contain at least one TimeType and may
   contain multiple TimeType entries.  The purpose of listing multiple
   TimeType entries is to indicate multiple different values and value
   types that are acceptable to the client.  The client lists the
   TimeType entries in order of preference.
</t>
<t>
   Timeout response values MUST use a Second value, Infinite, or a
   TimeType the client has indicated familiarity with.  The server may
   assume a client is familiar with any TimeType submitted in a Timeout
   header.
</t>
<t>
   The "Second" TimeType specifies the number of seconds that will
   elapse between granting of the lock at the server, and the automatic
   removal of the lock.  The timeout value for TimeType "Second" MUST
   NOT be greater than 2^32-1.
</t>
</section>



</section>


<section title="Capability discovery" anchor="capability.discovery">

<section title="OPTIONS method">
<iref item="DAV header" subitem="compliance class '2'"/>
<iref item="DAV header" subitem="compliance class 'locking'"/>
<t>
  If the server supports locking, it MUST return both the compliance class names
  "2" and "locking" as fields in the "DAV" response header (see <xref target="RFC2518"/>,
  section 9.1) from an OPTIONS request on any resource implemented by that
  server.  A value of "2" or "locking" in the "DAV" response header MUST indicate that
  the server meets all class "1" requirements defined in <xref target="RFC2518"/>
  and supports all MUST level requirements and REQUIRED features
  specified in this document, including:
  <list style="symbols">
    <t>LOCK and UNLOCK methods,</t>
    <t>DAV:lockdiscovery and DAV:supportedlock properties,</t>
    <t>"Time-Out" request header, "Lock-Token" request and response header.</t>
  </list>
</t>
<t>
  Note that for servers implementing this specification, the compliance classes
  "2" and "locking" are synonymous.  However, new clients can take advantage
  of the new "locking" compliance class to detect server support for changes
  introduced by this specification (see <xref target="changes.to.rfc2518"/>).
</t>
</section>

</section>

<section title="Security considerations" anchor="security.considerations">

<t>
  All security considerations mentioned in <xref target="RFC2518"/> also apply to
  this document.  Additionally, lock tokens introduce new privacy issues
  discussed below.
</t>
<section title="Privacy Issues Connected to Locks" anchor="risks.connected.with.lock.tokens">
<t>
   When submitting a lock request a user agent may also submit an owner
   XML field giving contact information for the person taking out the
   lock (for those cases where a person, rather than a robot, is taking
   out the lock).  This contact information is stored in a DAV:lockdiscovery
   property on the resource, and can be used by other collaborators to
   begin negotiation over access to the resource.  However, in many
   cases this contact information can be very private, and should not be
   widely disseminated.  Servers SHOULD limit read access to the
   DAV:lockdiscovery property as appropriate.  Furthermore, user agents
   SHOULD provide control over whether contact information is sent at
   all, and if contact information is sent, control over exactly what
   information is sent.
</t>
</section>
</section>

<section title="Internationalization Considerations" anchor="internationalization.considerations">
<t>
  All internationalization considerations mentioned in <xref target="RFC2518"/> also apply to
  this document.
</t>
</section>

<section title="IANA Considerations" anchor="iana.considerations">
<t>
  This specification updates the definition of the "opaquelocktoken" URI scheme
  described in <xref target="opaquelocktoken.lock.token.uri.scheme"/>, registered
  my means of <xref target="RFC2518"/>, section 6.4.  There are no additional
  IANA considerations.
</t>

</section>

<section title="Acknowledgements" anchor="acknowledgments">
<t>
  This document is the collaborative product of
  <list style="symbols">
    <t>the authors,</t>
    <t>the maintainers of  RFC2518bis - Jason Crawford and Lisa Dusseault - and</t>
    <t>the original authors of RFC2518 - Steve Carter, Asad Faizi, Yaron Goland,
    Del Jensen and Jim Whitehead.</t>
  </list>
  This document has also benefited from thoughtful discussion by
  Mark Anderson,
  Dan Brotksy, Geoff Clemm, Jim Davis, Stefan Eissing, Rickard Falk, Eric Glass, Stanley Guan, Larry Masinter,
  Joe Orton, Juergen Pill, Elias Sinderson, Greg Stein, Kevin Wiggen,
  and other members of the WebDAV working group.
</t>
</section>

</middle>

	<back>


  <references title="Normative References">
  
    <reference anchor="RFC2119">
      <front>
        <title abbrev="RFC Key Words">Key words for use in RFCs to Indicate Requirement Levels</title>
        <author initials="S." surname="Bradner" fullname="Scott Bradner">
        <organization>Harvard University</organization>
        <address>
          <email>sob@harvard.edu</email>
        </address></author>
        <date month="March" year="1997"/>
      </front>
      <seriesInfo name="BCP" value="14"/>
      <seriesInfo name="RFC" value="2119"/>
    </reference>

<ed:replace datetime="2005-01-25" ed:resolves="uri_draft_ref"><ed:del>
<reference anchor="draft-fielding-rfc2396bis">
  <front>
    <title abbrev="URI Generic Syntax">Uniform Resource Identifier (URI): Generic Syntax</title>
    <author initials="T." surname="Berners-Lee" fullname="Tim Berners-Lee">
      <organization abbrev="W3C/MIT">World Wide Web Consortium</organization>
      <address>
        <email>timbl@w3.org</email>
      </address>
    </author>
    <author initials="R." surname="Fielding" fullname="Roy T. Fielding">
      <organization abbrev="Day Software">Day Software</organization>
      <address>
        <email>fielding@gbiv.com</email>
      </address>
    </author>
    <author initials="L." surname="Masinter" fullname="Larry Masinter">
      <organization abbrev="Adobe">Adobe Systems Incorporated</organization>
      <address>
        <email>LMM@acm.org</email>
      </address>
    </author>
    <date month="September" year="2004"/>
  </front>
  <seriesInfo name="ID" value="draft-fielding-rfc2396bis-07"/>
</reference>
</ed:del><ed:ins>
<reference anchor="RFC3986">
  <front>
    <title abbrev="URI Generic Syntax">Uniform Resource Identifier (URI): Generic Syntax</title>
    <author initials="T." surname="Berners-Lee" fullname="Tim Berners-Lee">
      <organization abbrev="W3C/MIT">World Wide Web Consortium</organization>
      <address>
        <email>timbl@w3.org</email>
      </address>
    </author>
    <author initials="R." surname="Fielding" fullname="Roy T. Fielding">
      <organization abbrev="Day Software">Day Software</organization>
      <address>
        <email>fielding@gbiv.com</email>
      </address>
    </author>
    <author initials="L." surname="Masinter" fullname="Larry Masinter">
      <organization abbrev="Adobe">Adobe Systems Incorporated</organization>
      <address>
        <email>LMM@acm.org</email>
      </address>
    </author>
    <date month="January" year="2005"/>
  </front>
  <seriesInfo name="STD" value="66"/>
  <seriesInfo name="RFC" value="3986"/>
</reference>
</ed:ins></ed:replace>

    <reference anchor="RFC2518">
      <front>
        <title>HTTP Extensions for Distributed Authoring -- WEBDAV</title>
        <author initials="Y." surname="Goland" fullname="Y. Goland">
          <organization>Microsoft Corporation</organization>
          <address><email>yarong@microsoft.com</email></address>
        </author>
        <author initials="E." surname="Whitehead" fullname="E. J. Whitehead, Jr.">
          <organization abbrev="UC Irvine">Dept. Of Information and Computer Science, University of California, Irvine</organization>
        	<address><email>ejw@ics.uci.edu</email></address>
        </author>
        <author initials="A." surname="Faizi" fullname="A. Faizi">
          <organization abbrev="Netscape">Netscape</organization>
          <address><email>asad@netscape.com</email></address>
        </author>
        <author initials="S.R." surname="Carter" fullname="S. R. Carter">
          <organization abbrev="Novell">Novell</organization>
          <address><email>srcarter@novell.com</email></address>
        </author>
        <author initials="D." surname="Jensen" fullname="D. Jensen">
          <organization abbrev="Novell">Novell</organization>
          <address><email>dcjensen@novell.com</email></address>
        </author>
        <date month="February" year="1999"/>
      </front>
      <seriesInfo name="RFC" value="2518"/>
    </reference>  

    <reference anchor="RFC2616">
      <front>
        <title>Hypertext Transfer Protocol -- HTTP/1.1</title>
        <author initials="R." surname="Fielding" fullname="R. Fielding">
          <organization>University of California, Irvine</organization>
          <address><email>fielding@ics.uci.edu</email></address>
        </author>
        <author initials="J." surname="Gettys" fullname="J. Gettys">
          <organization>W3C</organization>
          <address><email>jg@w3.org</email></address>
        </author>
        <author initials="J." surname="Mogul" fullname="J. Mogul">
          <organization>Compaq Computer Corporation</organization>
          <address><email>mogul@wrl.dec.com</email></address>
        </author>
        <author initials="H." surname="Frystyk" fullname="H. Frystyk">
          <organization>MIT Laboratory for Computer Science</organization>
          <address><email>frystyk@w3.org</email></address>
        </author>
        <author initials="L." surname="Masinter" fullname="L. Masinter">
          <organization>Xerox Corporation</organization>
          <address><email>masinter@parc.xerox.com</email></address>
        </author>
        <author initials="P." surname="Leach" fullname="P. Leach">
          <organization>Microsoft Corporation</organization>
          <address><email>paulle@microsoft.com</email></address>
        </author>
        <author initials="T." surname="Berners-Lee" fullname="T. Berners-Lee">
          <organization>W3C</organization>
          <address><email>timbl@w3.org</email></address>
        </author>
        <date month="June" year="1999"/>
      </front>
      <seriesInfo name="RFC" value="2616"/>
    </reference>

    <reference anchor="XML" target="http://www.w3.org/TR/2004/REC-xml-20040204">
      <front>
        <title>Extensible Markup Language (XML) 1.0 (Third Edition)</title>
        <author initials="T." surname="Bray" fullname="Tim Bray">
          <organization>Textuality and Netscape</organization>
          <address>
            <email>tbray@textuality.com</email>
          </address>
        </author>
        <author initials="J." surname="Paoli" fullname="Jean Paoli">
          <organization>Microsoft</organization>
          <address>
            <email>jeanpa@microsoft.com</email>
          </address>
        </author>
        <author initials="C.M." surname="Sperberg-McQueen" fullname="C. M. Sperberg-McQueen">
          <organization>University of Illinois at Chicago and Text Encoding Initiative</organization>
          <address>
            <email>cmsmcq@uic.edu</email>
          </address>
        </author>
        <author initials="E." surname="Maler" fullname="Eve Maler">
          <organization>Sun Microsystems</organization>
          <address>
            <email>eve.maler@east.sun.com</email>
          </address>
        </author>
        <author initials="F." surname="Yergeau" fullname="Francois Yergeau">
          <organization/>
          <address>
            <email>francois@yergeau.com</email>
          </address>
        </author>
        <date day="4" month="February" year="2004"/>
      </front>
      <seriesInfo name="W3C" value="REC-xml-20040204"/>
    </reference>
    
<ed:replace ed:resolves="D_delegate_UUID_definition" datetime="2005-02-06"><ed:del>
    <reference anchor="ISO-11578">
      <front>
        <title abbrev="ISO 11578">ISO/IEC 11578:1996. Information technology - Open
        Systems Interconnection - Remote Procedure Call
        (RPC)</title>
        <author>
          <organization>International Organization for Standardization</organization>
          <address>
            <uri>http://www.iso.ch</uri>
          </address>
        </author>
        <date year="1996"/>
      </front>
    </reference>
</ed:del><ed:ins>
    <reference anchor="draft-mealling-uuid-urn" target="http://www.ietf.org/internet-drafts/draft-mealling-uuid-urn-05.txt">
      <front>
        <title>A UUID URN Namespace</title>
        <author fullname="Paul Leach" initials="P." surname="Leach">
          <organization>Microsoft</organization>
          <address><email>paulle@microsoft.com</email></address>
        </author>
        <author fullname="Michael Mealling" initials="M." surname="Mealling">
          <organization>VeriSign, Inc.</organization>
          <address><email>michael@neonym.net</email></address>
        </author>
        <author fullname="Rich Salz" initials="R." surname="Salz">
          <organization>DataPower Technology, Inc.</organization>
          <address><email>rsalz@datapower.com</email></address>
        </author>
        <date year="2005" month="January" day="05"/>
      </front>
      <seriesInfo name="Internet-Draft" value="draft-mealling-uuid-urn-05"/>
    </reference>
</ed:ins></ed:replace>

  </references>
    
  <references title="Informative References">
    <reference anchor="RFC3744">
      <front>
        <title abbrev="WebDAV Access Control Protocol">Web Distributed Authoring and Versioning (WebDAV) Access Control Protocol</title>
        <author initials="G." surname="Clemm" fullname="Geoffrey Clemm">
          <organization>IBM</organization>
          <address>
            <postal>
              <street>20 Maguire Road</street>
              <city>Lexington</city>
              <region>MA</region>
              <code>02421</code>
            </postal>
            <email>geoffrey.clemm@us.ibm.com</email>
          </address>
        </author>
        <author initials="J. F." surname="Reschke" fullname="Julian F. Reschke">
          <organization abbrev="greenbytes">greenbytes GmbH</organization>
          <address>
            <postal>
              <street>Salzmannstrasse 152</street>
              <city>Muenster</city><region>NW</region><code>48159</code>
              <country>Germany</country>
            </postal>
            <email>julian.reschke@greenbytes.de</email>
          </address>
        </author>
        <author initials="E." surname="Sedlar" fullname="Eric Sedlar">
          <organization>Oracle Corporation</organization>
          <address>
            <postal>
              <street>500 Oracle Parkway</street>
              <city>Redwood Shores</city>
              <region>CA</region>
              <code>94065</code>
            </postal>
            <email>eric.sedlar@oracle.com</email>
          </address>
        </author>
        <author initials="J." surname="Whitehead" fullname="Jim Whitehead">
          <organization abbrev="U.C. Santa Cruz">U.C. Santa Cruz, Dept. of Computer Science</organization>
          <address>
            <postal>
              <street>1156 High Street</street>
              <city>Santa Cruz</city>
              <region>CA</region>
              <code>95064</code>
            </postal>
            <email>ejw@cse.ucsc.edu</email>
          </address>
        </author>
        <date month="May" year="2004"/>
      </front>
      <seriesInfo name="RFC" value="3744"/>
    </reference>

  </references>
  

<section title="Changes to RFC2518" anchor="changes.to.rfc2518">

<t>
  See <xref target="capability.discovery"/> for a description about how clients
  can discover support for this version of the WebDAV Locking protocol.
</t>

<section title="Removed/Deprecated features">

<section title="Implicit lock refresh">
<t>
  In section 9.8, <xref target="RFC2518"/> specifies that locks should be
  refreshed implicitly every time "...any time an owner of the lock sends a
  method to any member of the lock, including unsupported methods, or methods
  which are unsuccessful."  This features has been removed (locks need to
  be refreshed explicitly using the LOCK method).
</t>

<t>
  Compatibility consideration: clients historically have never relied on this
  feature as it was never implemented in widely deployed WebDAV servers.
</t>
</section>

<section title="Lock-null resources">
<t>
  In section 7.4, <xref target="RFC2518"/> specifies a special resource type
  called "lock-null resource" that's being created when a LOCK method
  request is applied to a null resource.  In practice, no real interoperability
  was achieved because many servers failed to implement this feature properly
  and few clients (if any) ever relied on that particular functionality.
</t>
<t>
  Removing this feature also means that there is no atomic way to create a collection
  in locked state, but in practice, this doesn't seem to be a problem.
</t>
<t>
  Compatibility consideration: there do not seem to be any widely deployed
  clients that actually relied on "lock-null resources".
</t>
</section>


</section>

<section title="Additional features">

<section title="DAV:lockroot element in DAV:activelock">
<t>
  Clients can take advantage of the new DAV:lockroot element to discover the URL
  to which the LOCK request (that created the lock) was applied.
</t>
<t>
  Compatibility consideration: clients will have to fail gracefully when
  communicating with older servers that do not support the new element.
</t>

</section>


<section title="Error Marshalling">
<t>
  Clients can take advantage of additional, detailed error information using
  the DAV:error element defined in <xref target="method.preconditions.and.postconditions"/>.
</t>
<t>
  Compatibility consideration: old clients should not even notice the
  additional informations.  New clients SHOULD handle absence of additional
  error information gracefully.
</t>
</section>


</section>

</section>


<section title="Text to be integrated from RFC2518">



<section title="HTTP Methods for Distributed Authoring">
<section title="LOCK Method">





<section title="Locking Replicated Resources">
<t>
   A resource may be made available through more than one URI.  However
   locks apply to resources, not URIs.  Therefore a LOCK request on a
   resource MUST NOT succeed if can not be honored by all the URIs
   through which the resource is addressable.
</t>
</section>


<section title="Depth and Locking">
<t>
   A Depth header of value 0 means to just lock the resource specified
   by the Request-URI.
</t>
<t>
   If the Depth header is set to infinity then the resource specified in
   the Request-URI along with all its internal members, all the way down
   the hierarchy, are to be locked.  A successful result MUST return a
   single lock token which represents all the resources that have been
   locked.  If an UNLOCK is successfully executed on this token, all
   associated resources are unlocked.  If the lock cannot be granted to
   all resources, a 207 (Multistatus) status code MUST be returned with a
   response entity body containing a multistatus XML element describing
   which resource(s) prevented the lock from being granted.  Hence,
   partial success is not an option.  Either the entire hierarchy is
   locked or no resources are locked.
</t>

</section>

<section title="Interaction with other Methods">
<t>
   The interaction of a LOCK with various methods is dependent upon the
   lock type.  However, independent of lock type, a successful DELETE of
   a resource MUST cause all of its locks to be removed.
</t>
</section>







</section>



</section>

<section title="HTTP Headers for Distributed Authoring" anchor="http.headers.for.distributed.authoring">




<section title="If Header" anchor="HEADER_If">
<ed:issue xmlns='http://www.w3.org/1999/xhtml' name="066_MUST_AN_IF_HEADER_CHECK_THE_ROOT_OF_URL" type="change" status="open">
  <ed:item>
    Right now the server uses the IF: header to verify that a client knows what
    locks it has that are affected by an operation before it allows the
    operation.  Must the client provide the root URL of a lock, any URL for a
    pertainent loc, or some specific URL  in the IF: header.
  </ed:item>
  <ed:item entered-by="ccjason@us.ibm.com" datetime="2002-01-14">
    It is felt by the group that it's important that the client not just own 
    and hold the lock token, but that it also know where the lock is rooted
    before it does tasks related to that lock.  This is just a point of info.
    The issue itself still needs to be brought up and answered.still
  </ed:item>
  <ed:item entered-by="julian.reschke@greenbytes.de" datetime="2004-06-18">
    Summary: current implementations do not seem to care (see
    <a href="http://lists.w3.org/Archives/Public/w3c-dist-auth/2004AprJun/0191.html">http://lists.w3.org/Archives/Public/w3c-dist-auth/2004AprJun/0190.html</a>).
    Suggestion to require clients to specify the lock root anyway, because this
    is what the WG agreed upon earlier.
  </ed:item>
</ed:issue>
<t>
  <cref source="reschke">Add "If" header considerations:</cref>
</t>
</section>




</section>





</section>

<section title="GULP" anchor="gulp">
<t>
  <spanx>Copied from </spanx><eref target="http://lists.w3.org/Archives/Public/w3c-dist-auth/2004AprJun/0177.html"/>.
</t>


<section title="Directly vs Indirectly" anchor="semantics.1">
<t>
  A lock either directly or indirectly locks a resource.
</t>
</section>

<section title="Creating Locks" anchor="semantics.2">
<t>
  A LOCK request with a non-empty body creates a new lock, and the
  resource identified by the Request-URI is directly locked by that lock.  The
  "lock-root" of the new lock is the Request-URI.  If at the time of
  the request, the Request-URI is not mapped to a resource, a new
  resource with empty content MUST be created by the request.
</t>
</section>

<section title="Lock Inheritance" anchor="semantics.3">
<t>
  If a collection is directly locked by a depth:infinity lock, all
  members of that collection (other than the collection itself) are
  indirectly locked by that lock.  In particular, if an internal
  member resource is added to a collection that is locked by a
  depth:infinity lock, and if the resource is not locked by that lock,
  then the resource becomes indirectly locked by that lock.  Conversely,
  if a resource is indirectly locked with a depth:infinity
  lock, and if the result of deleting an internal member URI is that
  the resource is no longer a member of the collection that is
  directly locked by that lock, then the resource is no longer locked
  by that lock.
</t>
</section>

<section title="Removing Locks" anchor="semantics.4">
<t>
  An UNLOCK request deletes the lock with the specified lock token.  The Request-URI
  of the request MUST identify a resource that
  is either directly or indirectly locked by that lock.  After a lock is deleted,
  no resource is locked by that lock.
</t>
</section>

<section title="Submitting Lock Tokens" anchor="semantics.5">
<t>
  A lock token is "submitted" in a request when it appears in an "If" request
  header.
</t>
</section>

<section title="Locked State" anchor="semantics.6">
<t>
  If a request would modify the content for a locked resource, a dead
  property of a locked resource, a live property that is defined to be
  lockable for a locked resource, or an internal member URI of a
  locked collection, the request MUST fail unless the lock-token for
  that lock is submitted in the request.  An internal member URI
  of a collection is considered to be modified if it is added,
  removed, or identifies a different resource.  
</t>
</section>

<section title="URL protection" anchor="semantics.7">
<t>
  If a request causes a directly locked resource to no longer be
  mapped to the lock-root of that lock, then the request MUST
  fail unless the lock-token for that lock is submitted in the
  request.  If the request succeeds, then that lock MUST have been
  deleted by that request.
</t>
</section>

<section title="Exclusive vs Shared" anchor="semantics.8">
<t>
  If a request would cause a resource to be locked by two different
  exclusive locks, the request MUST fail.
</t>
</section>

</section>

 
<ed:issue xmlns='http://www.w3.org/1999/xhtml' name="D_delegate_UUID_definition" type="change" status="closed">
  <ed:item entered-by="julian.reschke@greenbytes.de" date="2005-01-30">
    Delegate the definition of UUIDs to
    draft-mealling-uuid-urn.
  </ed:item>
  <ed:resolution datetime="2005-02-06">
    Done. See also <a href="http://lists.w3.org/Archives/Public/w3c-dist-auth/2005JanMar/0187.html">http://lists.w3.org/Archives/Public/w3c-dist-auth/2005JanMar/0187.html</a>.
  </ed:resolution>
</ed:issue>

<section title="'opaquelocktoken' URI Scheme" anchor="opaquelocktoken.lock.token.uri.scheme">
<iref item="opaquelocktoken (URI scheme)" primary="true"/>
<iref item="URI schemes" subitem="opaquelocktoken" primary="true"/>

<t>
   The opaquelocktoken URI scheme is designed to be unique across all
   resources for all time.  Due to this uniqueness quality, a client may
   submit an opaque lock token in an If header on a resource other than
   the one that returned it.
</t>
<t>
   All resources MUST recognize the opaquelocktoken scheme and, at
   minimum, recognize that the lock token does not refer to an
   outstanding lock on the resource.
</t>
<t>
   In order to guarantee uniqueness across all resources for all time
   the opaquelocktoken requires the use of the Universal Unique
   Identifier (UUID) mechanism, as described in <ed:replace ed:resolves="D_delegate_UUID_definition" datetime="2005-02-06"><ed:del>
<xref target="ISO-11578"/></ed:del><ed:ins>Section 4 of <xref target="draft-mealling-uuid-urn"/></ed:ins></ed:replace>.
</t>
<ed:replace ed:resolves="D_delegate_UUID_definition" datetime="2005-02-06"><ed:del>
<t>
   Opaquelocktoken generators, however, have a choice of how they create
   these tokens.  They can either generate a new UUID for every lock
   token they create or they can create a single UUID  and then add
   extension characters.  If the second method is selected then the
   program generating the extensions MUST guarantee that the same
   extension will never be used twice with the associated UUID.
</t>
<t>
   OpaqueLockToken-URI = "opaquelocktoken:" UUID [Extension]  ; The UUID
   production is the string representation of a UUID, as defined in
   <xref target="ISO-11578"/>. Note that white space (LWS) is not allowed between
   elements of this production.
</t>
<t>
   Extension = path  ; path is defined in 
   <ed:replace datetime="2005-01-25" ed:resolves="uri_draft_ref"><ed:del><xref target="draft-fielding-rfc2396bis"/></ed:del><ed:ins><xref target="RFC3986"/></ed:ins></ed:replace>, section 3.3.
</t>
</ed:del><ed:ins>
<figure><artwork type="abnf">
  OpaqueLockToken-URI = "opaquelocktoken:" UUID [path]
  ; UUID: see <xref target="draft-mealling-uuid-urn"/>, Section 3.
  ; path: see <xref target="RFC3986"/>, Section 3.3.
</artwork></figure>
</ed:ins>
</ed:replace>


<ed:replace ed:resolves="D_delegate_UUID_definition" datetime="2005-02-06"><ed:del>
<section title="Node Field Generation Without the IEEE 802 Address">
<t>
   UUIDs, as defined in <xref target="ISO-11578"/>, contain a "node" field that
   contains one of the IEEE 802 addresses for the server machine.  As
   noted in <xref target="risks.connected.with.lock.tokens"/>, there are several security risks associated
   with exposing a machine's IEEE 802 address. This section provides an
   alternate mechanism for generating the "node" field of a UUID which
   does not employ an IEEE 802 address.  WebDAV servers MAY use this
   algorithm for creating the node field when generating UUIDs.  The
   text in this section is originally from an Internet-Draft by Paul
   Leach and Rich Salz, who are noted here to properly attribute their
   work.
</t>
<t>
   The ideal solution is to obtain a 47 bit cryptographic quality random
   number, and use it as the low 47 bits of the node ID, with the most
   significant bit of the first octet of the node ID set to 1.  This bit
   is the unicast/multicast bit, which will never be set in IEEE 802
   addresses obtained from network cards; hence, there can never be a
   conflict between UUIDs generated by machines with and without network
   cards.
</t>
<t>
   If a system does not have a primitive to generate cryptographic
   quality random numbers, then in most systems there are usually a
   fairly large number of sources of randomness available from which one
   can be generated. Such sources are system specific, but often
   include:
</t>
<t>
  <list style="symbols">
    <t>the percent of memory in use</t>
    <t>the size of main memory in bytes</t>
    <t>the amount of free main memory in bytes</t>
    <t>the size of the paging or swap file in bytes</t>
    <t>free bytes of paging or swap file</t>
    <t>the total size of user virtual address space in bytes</t>
    <t>the total available user address space bytes</t>
    <t>the size of boot disk drive in bytes</t>
    <t>the free disk space on boot drive in bytes</t>
    <t>the current time</t>
    <t>the amount of time since the system booted</t>
    <t>the individual sizes of files in various system directories</t>
    <t>the creation, last read, and modification times of files in
      various system directories</t>
    <t>the utilization factors of various system resources (heap, etc.)</t>
    <t>current mouse cursor position</t>
    <t>current caret position</t>
    <t>current number of running processes, threads</t>
    <t>handles or IDs of the desktop window and the active window</t>
    <t>the value of stack pointer of the caller</t>
    <t>the process and thread ID of caller</t>
    <t>various processor architecture specific performance counters
      (instructions executed, cache misses, TLB misses)</t>
  </list>
</t>
<t>
   (Note that it is precisely the above kinds of sources of randomness
   that are used to seed cryptographic quality random number generators
   on systems without special hardware for their construction.)
</t>
<t>
   In addition, items such as the computer's name and the name of the
   operating system, while not strictly speaking random, will help
   differentiate the results from those obtained by other systems.
</t>
<t>
   The exact algorithm to generate a node ID using these data is system
   specific, because both the data available and the functions to obtain
   them are often very system specific. However, assuming that one can
   concatenate all the values from the randomness sources into a buffer,
   and that a cryptographic hash function such as MD5 is available, then
   any 6 bytes of the MD5 hash of the buffer, with the multicast bit
   (the high bit of the first byte) set will be an appropriately random
   node ID.
</t>
<t>
   Other hash functions, such as SHA-1, can also be used. The only
   requirement is that the result be suitably random in the sense that
   the outputs from a set uniformly distributed inputs are themselves
   uniformly distributed, and that a single bit change in the input can
   be expected to cause half of the output bits to change.
</t>
</section>
</ed:del></ed:replace>
</section>





<section title="Change Log (to be removed by RFC Editor before publication)">

<section title="Since draft-reschke-webdav-locking-00">
  <t>
    Add and resolve issue "rfc2606-compliance".
    Resolve issues "extract-locking", "updated-rfc2068",
    "022_COPY_OVERWRITE_LOCK_NULL", 
    "025_LOCK_REFRESH_BY_METHODS",
    "037_DEEP_LOCK_ERROR_STATUS",
    "039_MISSING_LOCK_TOKEN",
    "040_LOCK_ISSUES_01",  
    "040_LOCK_ISSUES_02",
    "040_LOCK_ISSUES_05",
    "043_NULL_LOCK_SLASH_URL",
    "065_UNLOCK_WHAT_URL",
    "077_LOCK_NULL_STATUS_CREATION",
    "080_DEFER_LOCK_NULL_RESOURCES_IN_SPEC",
    "089_FINDING_THE_ROOT_OF_A_DEPTH_LOCK",
    "101_LOCKDISCOVERY_FORMAT_FOR_MULTIPLE_SHARED_LOCKS",
    "109_HOW_TO_FIND_THE_ROOT_OF_A_LOCK"
    and "111_MULTIPLE_TOKENS_PER_LOCK".
    Add issue "import-gulp".
    Start work on moving text from RFC2518 excerpts into new sections.
    Define new compliance class "locking" (similar to "bis" in RFC2518bis, but
    only relevant to locking).  Reformatted "GULP" into separate subsections
    for easier reference.
  </t>
</section>

<section title="Since draft-reschke-webdav-locking-01">
  <t>
    Update "008_URI_URL",
    "040_LOCK_ISSUES_06",
    "063_LOCKS_SHOULD_THEY_USE_AN_IF_HEADER_TO_VERIFY",
    "067_UNLOCK_NEEDS_IF_HEADER",
    "068_UNLOCK_WITHOUT_GOOD_TOKEN".
    Re-opened "065_UNLOCK_WHAT_URL".
    Close "070_LOCK_RENEWAL_SHOULD_NOT_USE_IF_HEADER".
    Rewrite UNLOCK and LOCK refresh method descriptions.
    Fix page title (TXT version).
    Close "052_LOCK_BODY_SHOULD_BE_MUST",
    "054_IF_AND_AUTH",
    "060_LOCK_REFRESH_BODY" and
    "079_UNLOCK_BY_NON_LOCK_OWNER".
    Add and resolve "8.10.1_lockdiscovery_on_failure".
    Started attempt to clarify status code.
  </t>
</section>

<section title="Since draft-reschke-webdav-locking-02">
  <t>
    Resolve issues "040_LOCK_ISSUES_03", "040_LOCK_ISSUES_04", "040_LOCK_ISSUES_08"
    "053_LOCK_INHERITANCE",
    "057_LOCK_SEMANTICS",
    "067_UNLOCK_NEEDS_IF_HEADER" and
    "068_UNLOCK_WITHOUT_GOOD_TOKEN".
    Resolve issue "065_UNLOCK_WHAT_URL"; update to new GULP version (5.7).
    Add and resolve new issue "7.5_DELETE_vs_URIs".
    Start work on "additional marshalling" and "introduction".
    Update issues "044_REPORT_OTHER_RESOURCE_LOCKED" and "066_MUST_AN_IF_HEADER_CHECK_THE_ROOT_OF_URL".
  </t>
</section>

<section title="Since draft-reschke-webdav-locking-03">
<t>
  Close issues "import-rfc3253-stuff", "008_URI_URL", "015_MOVE_SECTION_6.4.1_TO_APPX",
  "044_REPORT_OTHER_RESOURCE_LOCKED", "056_DEPTH_LOCK_AND_IF"
  and "072_LOCK_URL_WITH_NO_PARENT_COLLECTION". Reformat condition name
  descriptions.  Add mention of condition failure signalling to "Changes"
  appendix.  Start edit of header descriptions (Depth, Timeout) and
  LOCK creation description.
  Open and close issue "3.2_lockdiscovery_depth".
  Start work on intro.
</t>
</section>

<section title="Since draft-reschke-webdav-locking-04">
<t>
  Add description of the lock as a resource and it's state (merging in
  Timeout semantics from old headers section).
  Close issues "040_LOCK_ISSUES_06", "063_LOCKS_SHOULD_THEY_USE_AN_IF_HEADER_TO_VERIFY" and "088_DAVOWNER_FIELD_IS_CLIENT_CONTROLED".
  Move edited version of "Write Lock" chapter.
</t>
</section>


<section title="Since draft-reschke-webdav-locking-05">
<t>
  Add and close issues "rfc2396bis" and "5.2.1-depth_header_vs_lock_refresh". Fixed DAV:lockdiscovery example.
</t>
</section>

<ed:replace datetime="2005-02-13"><ed:ins>
<section title="Since draft-reschke-webdav-locking-06">
<t>
  Add and resolve issues "uri_draft_ref", "abnf", "D_delegate_UUID_definition"
  and "lock_state_auth_principal".
</t>
</section>
</ed:ins></ed:replace>


</section>





  
    </back>
</rfc>