[ 
https://issues.apache.org/jira/browse/JCR-3209?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13187690#comment-13187690
 ] 

angela commented on JCR-3209:
-----------------------------

isn't 1) already covered by JCR-1352?

regarding 2) 

> The server currently computes lock tokens for session-scoped locks based on 
> the node id; these are not valid JCR lock tokens though 

this change was introduce since as of jcr 2.0 session scoped locks don't expose 
the token any more.
if you have a proposal for another type of token that's fine.

> and cause exceptions when they are re-added when they appear in a Lock-Token 
> header or an If header. 

as far as i know this just causes a ugly warning in the log file (written by 
jackrabbit-core), since adding the token to 
session fails, which in this case was useless any way as they are session 
scoped. but if i remember correctly it otherwise 
used to work (see also JCR-2990... which i resolved wontfix due to lack of 
priority)

> This will likely cause requests to fail that use both types of locks (yes, 
> maybe academic but should be fixed anyway) 

can't follow you here.

but anyway: it was definitely favorable if we can distinguish the two types of 
locks based on the token and
could therefore omit adding it to the session/lockmanager. 
                
> lock token validity
> -------------------
>
>                 Key: JCR-3209
>                 URL: https://issues.apache.org/jira/browse/JCR-3209
>             Project: Jackrabbit Content Repository
>          Issue Type: Task
>          Components: jackrabbit-jcr-server, jackrabbit-spi2dav, locks
>            Reporter: Julian Reschke
>            Priority: Minor
>
> There are several minor issues in the mapping between JCR lock tokens and 
> WebDAV lock tokens:
> 1) WebDAV lock tokens are supposed to use URI syntax (such as 
> opaquelocktoken: or urn:uuid:)
> 2) The server currently computes lock tokens for session-scoped locks based 
> on the node id; these are not valid JCR lock tokens though and cause 
> exceptions when they are re-added when they appear in a Lock-Token header or 
> an If header. This will likely cause requests to fail that use both types of 
> locks (yes, maybe academic but should be fixed anyway)
> Proposal:
> a) Map lock tokens to oqaquelocktoken URIs, using a constant UUID plus a 
> postfix encoding the original lock token
> b) Use a syntax that allows to distinguish between tokens for open-scoped 
> locks or session-scoped locks, so that we do not try to add the latter type 
> to the Session (alternatively, handle exceptions doing so gracefully)

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: 
https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to