HTTP defines methods (sometimes referred to as verbs) to indicate the desired action to be performed on the identified resource. What this resource represents, whether pre-existing data or data that is generated dynamically, depends on the implementation of the server. Often, the resource corresponds to a file or the output of an executable residing on the server.
The HTTP/1.0 specification defined the GET, POST and HEAD methods and the HTTP/1.1 specification added 5 new methods: OPTIONS, PUT, DELETE, TRACE and CONNECT. By being specified in these documents their semantics are well known and can be depended upon. Any client can use any method and the server can be configured to support any combination of methods. If a method is unknown to an intermediate it will be treated as an unsafe and non-idempotent method. There is no limit to the number of methods that can be defined and this allows for future methods to be specified without breaking existing infrastructure. For example WebDAV defined 7 new methods and RFC5789 specified the PATCH method.
- Requests a representation of the specified resource. Requests using GET should only retrieve data and should have no other effect. (This is also true of some other HTTP methods.) The W3C has published guidance principles on this distinction, saying, "Web application design should be informed by the above principles, but also by the relevant limitations." See safe methods below.
- Asks for the response identical to the one that would correspond to a GET request, but without the response body. This is useful for retrieving meta-information written in response headers, without having to transport the entire content.
- Submits data to be processed (e.g., from an HTML form) to the identified resource. The data is included in the body of the request. This may result in the creation of a new resource or the updates of existing resources or both.
- Uploads a representation of the specified resource.
- Deletes the specified resource.
- Echoes back the received request so that a client can see what (if any) changes or additions have been made by intermediate servers.
- Returns the HTTP methods that the server supports for specified URL. This can be used to check the functionality of a web server by requesting '*' instead of a specific resource.
- Converts the request connection to a transparent TCP/IP tunnel, usually to facilitate SSL-encrypted communication (HTTPS) through an unencrypted HTTP proxy.
- Is used to apply partial modifications to a resource.
HTTP servers are required to implement at least the GET and HEAD methods and, whenever possible, also the OPTIONS method.
Read more about this topic: Hypertext Transfer Protocol
Other articles related to "request methods, methods, requests, method, request, request method":
... Implementing methods such as TRACE, TRACK and DEBUG is considered potentially insecure by some security professionals because attackers can use them to gather information or bypass security ... and Microsoft UrlScan Security Tool report on the presence of these methods as being security issues ...
... found on the talk page The HTTP and HTTPS requests of the XMLHttpRequest object must be initialized through the open method ... This method must be invoked prior to the actual sending of a request to validate and resolve the request method, URL, and URI user information to be used for the ... This method does not assure that the URL exists or the user information is correct ...
Famous quotes containing the words methods and/or request:
“If you want to know the taste of a pear, you must change the pear by eating it yourself.... If you want to know the theory and methods of revolution, you must take part in revolution. All genuine knowledge originates in direct experience.”
—Mao Zedong (18931976)
“Mr. Roosevelt, this is my principal requestit is almost the last request I shall ever make of anybody. Before you leave the presidential chair, recommend Congress to submit to the Legislatures a Constitutional Amendment which will enfranchise women, and thus take your place in history with Lincoln, the great emancipator. I beg of you not to close your term of office without doing this.”
—Susan B. Anthony (18201906)