Skip to content

Commit f5d448e

Browse files
committed
Line brakes
1 parent 75ae7e0 commit f5d448e

File tree

1 file changed

+37
-33
lines changed

1 file changed

+37
-33
lines changed

IETF-RFC.md

Lines changed: 37 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,8 @@ related concepts from OAuth [RFC6749] and elsewhere:
124124
Resource through an API (e.g., WebDAV [RFC4918]) of the sending
125125
server.
126126
* __Sending Gesture__ - A user interface interaction from the Sending
127-
Party to the Sending Server, conveying the intention to create a Share.
127+
Party to the Sending Server, conveying the intention to create a
128+
Share.
128129
* __Share Creation__ - The addition of a Share to the database state of
129130
the Sending Server, in response to a successful Sending Gesture or for
130131
another reason.
@@ -143,9 +144,9 @@ related concepts from OAuth [RFC6749] and elsewhere:
143144
identify a user or group "at" an OCM Server and MAY be referred to as
144145
Federated Cloud ID.
145146
`<Receiving Party's identifier>` is an opaque string, unique at the
146-
server. `<fqdn>` is the Fully Qualified Domain Name by which the server
147-
is identified. This MUST be the domain at which the `/.well-known/ocm`
148-
endpoint of that server is hosted.
147+
server. `<fqdn>` is the Fully Qualified Domain Name by which the
148+
server is identified. This MUST be the domain at which the
149+
`/.well-known/ocm` endpoint of that server is hosted.
149150
* __OCM Notification__ - A message from the Receiving Server to the
150151
Sending Server or vice versa, using the OCM Notifications endpoint.
151152
* __Invite Message__ - Out-of-band message used to establish contact
@@ -165,17 +166,18 @@ related concepts from OAuth [RFC6749] and elsewhere:
165166
generated by the Invite Sender OCM Server and linked uniquely to the
166167
Invite Sender's OCM Address.
167168
* __Invite Creation Gesture__ - Gesture from the Invite Sender to the
168-
Invite Sender OCM Server, resulting in the creation of an Invite Token.
169+
Invite Sender OCM Server, resulting in the creation of an Invite
170+
Token.
169171
* __Invite Acceptance Gesture__ - Gesture from the Invite Receiver to
170172
the Invite Receiver OCM Server, supplying the Invite Token as well as
171173
the OCM Address of the Invite Sender, effectively allowlisting the
172174
Invite Sender OCM Server for sending Share Creation Notifications to
173175
the Invite Receiver OCM Server.
174176
* __Invite Acceptance Request__ - API call from the Invite Receiver OCM
175177
Server to the Invite Sender OCM Server, supplying the Invite Token as
176-
well as the OCM Address of the Invite Receiver, effectively allowlisting
177-
the Invite Sender OCM Server for sending Share Creation Notifications to
178-
the Invite Receiver OCM Server.
178+
well as the OCM Address of the Invite Receiver, effectively
179+
allowlisting the Invite Sender OCM Server for sending Share Creation
180+
Notifications to the Invite Receiver OCM Server.
179181
* __Invite Acceptance Response__ - HTTP response to the Invite
180182
Acceptance Request.
181183
* __Share Name__ - A human-readable string, provided by the Sending
@@ -347,8 +349,8 @@ The Invite Acceptance Response SHOULD be a HTTP response:
347349
- REQUIRED: `userID` - the Invite Sender's identifier at their OCM
348350
Server
349351
- REQUIRED: `email` - non-normative / informational; an email address
350-
for the Invite Sender. Not necessarily at the same FQDN as their OCM
351-
Server
352+
for the Invite Sender. Not necessarily at the same FQDN as their
353+
OCM Server
352354
- REQUIRED: `name` - human-readable name of the Invite Sender, as a
353355
suggestion for display in the Invite Receiver's address book
354356

@@ -511,8 +513,8 @@ contain the following information about its OCM API:
511513
endpoint. Example: `"MyCloudStorage"`
512514
* REQUIRED: resourceTypes (array) - A list of all resource types this
513515
server supports in both the Sending Server role and the Receiving
514-
Server role, with their access protocols. Each item in this list SHOULD
515-
itself be an object containing the following fields:
516+
Server role, with their access protocols. Each item in this list
517+
SHOULD itself be an object containing the following fields:
516518
- name (string) - A supported resource type (file, calendar,
517519
contact, ...).
518520
Implementations MUST offer support for at least one
@@ -740,8 +742,8 @@ servers MAY only support `webdav`.
740742
Resource.
741743
- OPTIONAL requirements (array of strings) -
742744
The requirements that the sharee MUST fulfill to
743-
access the Resource. A subset of: - `mfa-enforced` requires the consumer to be
744-
MFA-authenticated. This MAY be used if the
745+
access the Resource. A subset of: - `mfa-enforced` requires the
746+
consumer to be MFA-authenticated. This MAY be used if the
745747
recipient provider exposes the `enforce-mfa`
746748
capability. - `use-code` requires the consumer to exchange
747749
the given `code` via a signed HTTPS request. This
@@ -756,10 +758,10 @@ servers MAY only support `webdav`.
756758
the `/.well-known/ocm` endpoint MUST be used.
757759
Absolute URIs are deprecated.
758760
- REQUIRED viewMode (string)
759-
The permissions granted to the sharee. A subset of: - `view` allows access to the web app in view-only
760-
mode. - `read` allows read and download access via the
761-
web app. - `write` allows full editing rights via the web
762-
app.
761+
The permissions granted to the sharee. A subset of: - `view`
762+
allows access to the web app in view-only mode. - `read` allows
763+
read and download access via the web app. - `write` allows full
764+
editing rights via the web app.
763765
- OPTIONAL sharedSecret (string)
764766
An optional secret to be used to access the remote
765767
web app, for example in the form of a bearer token.
@@ -880,8 +882,8 @@ is as follows:
880882
1. The receiver MUST extract the OCM Server FQDN from the `sender`
881883
field of the received share, and MUST query the
882884
[Discovery](#ocm-api-discovery) endpoint at that address: the
883-
`resourceTypes[0].protocols.webdav` value is the `<sender-ocm-path>` to
884-
be used in step 3.
885+
`resourceTypes[0].protocols.webdav` value is the
886+
`<sender-ocm-path>` to be used in step 3.
885887
2. If `code` is not empty, the receiver SHOULD make a signed POST
886888
request to the `/token` path inside the Sending Server's OCM API, to
887889
exchange the code for a short-lived bearer token, and then use that
@@ -899,11 +901,11 @@ is as follows:
899901
receiver MUST make a HTTP PROPFIND request against it to access the
900902
Remote Resource. If it only contains an identifier `<key>`, the
901903
receiver MUST make a HTTP PROPFIND request to
902-
`https://<sender-host><sender-ocm-path>/<key>` in order to access the
903-
Remote Resource. Additionally, the receiver MUST pass an
904-
`Authorization: bearer` header with either the short-lived bearer token
905-
obtained in step 2, if applicable, or the `protocol.webdav.sharedSecret`
906-
value.
904+
`https://<sender-host><sender-ocm-path>/<key>` in order to access
905+
the Remote Resource. Additionally, the receiver MUST pass an
906+
`Authorization: bearer` header with either the short-lived bearer
907+
token obtained in step 2, if applicable, or the
908+
`protocol.webdav.sharedSecret` value.
907909

908910
In all cases, in case the Shared Resource is a folder and the Receiving
909911
Server accesses a Resource within that shared folder, it SHOULD append
@@ -985,14 +987,16 @@ Implementers SHOULD NOT use it and prefer short-lived tokens instead.
985987

986988
## Normative References
987989

988-
[RFC2119] Bradner, S. "[Key words for use in RFCs to Indicate Requirement
989-
Levels](https://datatracker.ietf.org/doc/html/rfc2119)", March 1997.
990+
[RFC2119] Bradner, S. "[Key words for use in RFCs to Indicate
991+
Requirement Levels](https://datatracker.ietf.org/doc/html/rfc2119)",
992+
March 1997.
990993

991-
[RFC4918] Dusseault, L. M. "[HTTP Extensions for Web Distributed Authoring
992-
and Versioning](https://datatracker.ietf.org/html/rfc4918/)", June 2007.
994+
[RFC4918] Dusseault, L. M. "[HTTP Extensions for Web Distributed
995+
Authoring and Versioning](https://datatracker.ietf.org/html/rfc4918/)",
996+
June 2007.
993997

994-
[RFC8174] Leiba, B. "[Ambiguity of Uppercase vs Lowercase in RFC 2119 Key
995-
Words](https://datatracker.ietf.org/html/rfc8174)", May 2017.
998+
[RFC8174] Leiba, B. "[Ambiguity of Uppercase vs Lowercase in RFC 2119
999+
Key Words](https://datatracker.ietf.org/html/rfc8174)", May 2017.
9961000

9971001
[RFC9421] Backman, A., Richer, J. and Sporny, M. "[HTTP Message
9981002
Signatures](https://tools.ietf.org/html/rfc9421)", February 2024.
@@ -1073,8 +1077,8 @@ Here is an example of headers needed to sign a request.
10731077
signature
10741078
- 'signature' the signature of an array containing the properties
10751079
listed in 'headers'. Some properties like content-length, date,
1076-
content-digest, and host are mandatory to protect against authenticity
1077-
override.
1080+
content-digest, and host are mandatory to protect against
1081+
authenticity override.
10781082

10791083
## How to generate the Signature for outgoing request
10801084

0 commit comments

Comments
 (0)