Remove the requirement opaquelocktoken uri scheme

The program flow of pushing over http is:

 - call lock_remote() to issue a DAV_LOCK request to the server to lock
   info/refs and branch refs being pushed into; handle_new_lock_ctx() is
   used to parse its response to populate "struct remote_lock" that is
   returned from lock_remote();

 - send objects;

 - call unlock_remote() to drop the lock.

The handle_new_lock_ctx() function assumed that the server will use a
lock token in opaquelocktoken URI scheme, which may have been an Ok
assumption under RFC 2518, but under RFC 4918 which obsoletes the older
standard it is not necessarily true.

This resulted in push failure (often resulted in "cannot lock existing
info/refs" error message) when talking to a server that does not use
opaquelocktoken URI scheme.

Signed-off-by: Kirill A. Korinskiy <catap@catap.ru>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
This commit is contained in:
Kirill A. Korinskiy 2008-12-20 09:19:46 +03:00 коммит произвёл Junio C Hamano
Родитель 08fc060865
Коммит 753bc911f4
1 изменённых файлов: 6 добавлений и 8 удалений

Просмотреть файл

@ -595,7 +595,7 @@ static int refresh_lock(struct remote_lock *lock)
lock->refreshing = 1; lock->refreshing = 1;
if_header = xmalloc(strlen(lock->token) + 25); if_header = xmalloc(strlen(lock->token) + 25);
sprintf(if_header, "If: (<opaquelocktoken:%s>)", lock->token); sprintf(if_header, "If: (<%s>)", lock->token);
sprintf(timeout_header, "Timeout: Second-%ld", lock->timeout); sprintf(timeout_header, "Timeout: Second-%ld", lock->timeout);
dav_headers = curl_slist_append(dav_headers, if_header); dav_headers = curl_slist_append(dav_headers, if_header);
dav_headers = curl_slist_append(dav_headers, timeout_header); dav_headers = curl_slist_append(dav_headers, timeout_header);
@ -1120,10 +1120,8 @@ static void handle_new_lock_ctx(struct xml_ctx *ctx, int tag_closed)
lock->timeout = lock->timeout =
strtol(ctx->cdata + 7, NULL, 10); strtol(ctx->cdata + 7, NULL, 10);
} else if (!strcmp(ctx->name, DAV_ACTIVELOCK_TOKEN)) { } else if (!strcmp(ctx->name, DAV_ACTIVELOCK_TOKEN)) {
if (!prefixcmp(ctx->cdata, "opaquelocktoken:")) { lock->token = xmalloc(strlen(ctx->cdata) + 1);
lock->token = xmalloc(strlen(ctx->cdata) - 15); strcpy(lock->token, ctx->cdata);
strcpy(lock->token, ctx->cdata + 16);
}
} }
} }
} }
@ -1308,7 +1306,7 @@ static int unlock_remote(struct remote_lock *lock)
int rc = 0; int rc = 0;
lock_token_header = xmalloc(strlen(lock->token) + 31); lock_token_header = xmalloc(strlen(lock->token) + 31);
sprintf(lock_token_header, "Lock-Token: <opaquelocktoken:%s>", sprintf(lock_token_header, "Lock-Token: <%s>",
lock->token); lock->token);
dav_headers = curl_slist_append(dav_headers, lock_token_header); dav_headers = curl_slist_append(dav_headers, lock_token_header);
@ -1722,7 +1720,7 @@ static int update_remote(unsigned char *sha1, struct remote_lock *lock)
struct curl_slist *dav_headers = NULL; struct curl_slist *dav_headers = NULL;
if_header = xmalloc(strlen(lock->token) + 25); if_header = xmalloc(strlen(lock->token) + 25);
sprintf(if_header, "If: (<opaquelocktoken:%s>)", lock->token); sprintf(if_header, "If: (<%s>)", lock->token);
dav_headers = curl_slist_append(dav_headers, if_header); dav_headers = curl_slist_append(dav_headers, if_header);
strbuf_addf(&out_buffer.buf, "%s\n", sha1_to_hex(sha1)); strbuf_addf(&out_buffer.buf, "%s\n", sha1_to_hex(sha1));
@ -1941,7 +1939,7 @@ static void update_remote_info_refs(struct remote_lock *lock)
add_remote_info_ref, &buffer.buf); add_remote_info_ref, &buffer.buf);
if (!aborted) { if (!aborted) {
if_header = xmalloc(strlen(lock->token) + 25); if_header = xmalloc(strlen(lock->token) + 25);
sprintf(if_header, "If: (<opaquelocktoken:%s>)", lock->token); sprintf(if_header, "If: (<%s>)", lock->token);
dav_headers = curl_slist_append(dav_headers, if_header); dav_headers = curl_slist_append(dav_headers, if_header);
slot = get_active_slot(); slot = get_active_slot();