2008-02-27 20:28:45 +01:00
|
|
|
#!/bin/sh
|
|
|
|
#
|
|
|
|
# Copyright (c) 2008 Clemens Buchacher <drizzd@aon.at>
|
|
|
|
#
|
|
|
|
|
|
|
|
test_description='test http-push
|
|
|
|
|
|
|
|
This test runs various sanity checks on http-push.'
|
|
|
|
|
|
|
|
. ./test-lib.sh
|
|
|
|
|
|
|
|
ROOT_PATH="$PWD"
|
|
|
|
LIB_HTTPD_DAV=t
|
|
|
|
|
2008-07-07 21:02:50 +02:00
|
|
|
if git http-push > /dev/null 2>&1 || [ $? -eq 128 ]
|
|
|
|
then
|
|
|
|
say "skipping test, USE_CURL_MULTI is not defined"
|
|
|
|
test_done
|
|
|
|
exit
|
|
|
|
fi
|
|
|
|
|
2008-08-08 11:26:28 +02:00
|
|
|
. "$TEST_DIRECTORY"/lib-httpd.sh
|
2008-02-27 20:28:45 +01:00
|
|
|
|
|
|
|
if ! start_httpd >&3 2>&4
|
|
|
|
then
|
|
|
|
say "skipping test, web server setup failed"
|
|
|
|
test_done
|
|
|
|
exit
|
|
|
|
fi
|
|
|
|
|
|
|
|
test_expect_success 'setup remote repository' '
|
|
|
|
cd "$ROOT_PATH" &&
|
|
|
|
mkdir test_repo &&
|
|
|
|
cd test_repo &&
|
|
|
|
git init &&
|
|
|
|
: >path1 &&
|
|
|
|
git add path1 &&
|
|
|
|
test_tick &&
|
|
|
|
git commit -m initial &&
|
|
|
|
cd - &&
|
|
|
|
git clone --bare test_repo test_repo.git &&
|
|
|
|
cd test_repo.git &&
|
|
|
|
git --bare update-server-info &&
|
2008-08-12 00:34:46 +02:00
|
|
|
mv hooks/post-update.sample hooks/post-update &&
|
2008-02-27 20:28:45 +01:00
|
|
|
cd - &&
|
2008-07-07 21:02:37 +02:00
|
|
|
mv test_repo.git "$HTTPD_DOCUMENT_ROOT_PATH"
|
2008-02-27 20:28:45 +01:00
|
|
|
'
|
2008-06-14 09:25:56 +02:00
|
|
|
|
2008-02-27 20:28:45 +01:00
|
|
|
test_expect_success 'clone remote repository' '
|
|
|
|
cd "$ROOT_PATH" &&
|
|
|
|
git clone $HTTPD_URL/test_repo.git test_repo_clone
|
|
|
|
'
|
|
|
|
|
2009-01-17 16:41:41 +01:00
|
|
|
test_expect_failure 'push to remote repository with packed refs' '
|
2008-02-27 20:28:45 +01:00
|
|
|
cd "$ROOT_PATH"/test_repo_clone &&
|
|
|
|
: >path2 &&
|
|
|
|
git add path2 &&
|
|
|
|
test_tick &&
|
|
|
|
git commit -m path2 &&
|
2009-01-17 16:41:41 +01:00
|
|
|
HEAD=$(git rev-parse --verify HEAD) &&
|
2008-07-07 23:06:46 +02:00
|
|
|
git push &&
|
2009-01-17 16:41:41 +01:00
|
|
|
(cd "$HTTPD_DOCUMENT_ROOT_PATH"/test_repo.git &&
|
|
|
|
test $HEAD = $(git rev-parse --verify HEAD))
|
2008-02-27 20:28:45 +01:00
|
|
|
'
|
|
|
|
|
2009-01-17 16:41:41 +01:00
|
|
|
test_expect_success ' push to remote repository with unpacked refs' '
|
|
|
|
(cd "$HTTPD_DOCUMENT_ROOT_PATH"/test_repo.git &&
|
|
|
|
rm packed-refs &&
|
|
|
|
git update-ref refs/heads/master \
|
|
|
|
0c973ae9bd51902a28466f3850b543fa66a6aaf4) &&
|
|
|
|
git push &&
|
|
|
|
(cd "$HTTPD_DOCUMENT_ROOT_PATH"/test_repo.git &&
|
|
|
|
test $HEAD = $(git rev-parse --verify HEAD))
|
|
|
|
'
|
|
|
|
|
|
|
|
test_expect_success 'create and delete remote branch' '
|
2008-02-27 20:28:45 +01:00
|
|
|
cd "$ROOT_PATH"/test_repo_clone &&
|
|
|
|
git checkout -b dev &&
|
|
|
|
: >path3 &&
|
|
|
|
git add path3 &&
|
|
|
|
test_tick &&
|
|
|
|
git commit -m dev &&
|
|
|
|
git push origin dev &&
|
|
|
|
git fetch &&
|
|
|
|
git push origin :dev &&
|
|
|
|
git branch -d -r origin/dev &&
|
|
|
|
git fetch &&
|
2008-07-12 17:47:52 +02:00
|
|
|
test_must_fail git show-ref --verify refs/remotes/origin/dev
|
2008-02-27 20:28:45 +01:00
|
|
|
'
|
|
|
|
|
2009-01-17 16:11:51 +01:00
|
|
|
test_expect_success 'MKCOL sends directory names with trailing slashes' '
|
|
|
|
|
|
|
|
! grep "\"MKCOL.*[^/] HTTP/[^ ]*\"" < "$HTTPD_ROOT_PATH"/access.log
|
|
|
|
|
|
|
|
'
|
|
|
|
|
2009-02-27 00:44:40 +01:00
|
|
|
x1="[0-9a-f]"
|
|
|
|
x2="$x1$x1"
|
|
|
|
x5="$x1$x1$x1$x1$x1"
|
|
|
|
x38="$x5$x5$x5$x5$x5$x5$x5$x1$x1$x1"
|
|
|
|
x40="$x38$x2"
|
use a hash of the lock token as the suffix for PUT/MOVE
After 753bc91 ("Remove the requirement opaquelocktoken uri scheme"),
lock tokens are in the URI forms in which they are received from the
server, eg. 'opaquelocktoken:', 'urn:uuid:'.
However, "start_put" (and consequently "start_move"), which attempts to
create a unique temporary file using the UUID of the lock token,
inadvertently uses the lock token in its URI form. These file
operations on the server may not be successful (specifically, in
Windows), due to the colon ':' character from the URI form of the lock
token in the file path.
This patch uses a hash of the lock token instead, guaranteeing only
"safe" characters (a-f, 0-9) are used in the file path.
The token's hash is generated when the lock token is received from the
server in handle_new_lock_ctx, minimizing the number of times of
hashing.
Signed-off-by: Tay Ray Chuan <rctay89@gmail.com>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
2009-02-14 10:52:14 +01:00
|
|
|
|
2009-02-27 00:44:40 +01:00
|
|
|
test_expect_success 'PUT and MOVE sends object to URLs with SHA-1 hash suffix' '
|
|
|
|
sed -e "s/PUT /OP /" -e "s/MOVE /OP /" "$HTTPD_ROOT_PATH"/access.log |
|
|
|
|
grep -e "\"OP .*/objects/$x2/${x38}_$x40 HTTP/[.0-9]*\" 20[0-9] "
|
use a hash of the lock token as the suffix for PUT/MOVE
After 753bc91 ("Remove the requirement opaquelocktoken uri scheme"),
lock tokens are in the URI forms in which they are received from the
server, eg. 'opaquelocktoken:', 'urn:uuid:'.
However, "start_put" (and consequently "start_move"), which attempts to
create a unique temporary file using the UUID of the lock token,
inadvertently uses the lock token in its URI form. These file
operations on the server may not be successful (specifically, in
Windows), due to the colon ':' character from the URI form of the lock
token in the file path.
This patch uses a hash of the lock token instead, guaranteeing only
"safe" characters (a-f, 0-9) are used in the file path.
The token's hash is generated when the lock token is received from the
server in handle_new_lock_ctx, minimizing the number of times of
hashing.
Signed-off-by: Tay Ray Chuan <rctay89@gmail.com>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
2009-02-14 10:52:14 +01:00
|
|
|
|
|
|
|
'
|
|
|
|
|
2008-02-27 20:28:45 +01:00
|
|
|
stop_httpd
|
|
|
|
|
|
|
|
test_done
|