Many hyperlinks are disabled.
Use anonymous login
to enable hyperlinks.
Overview
| Comment: | Updates to the "sync protocol" document. |
|---|---|
| Downloads: | Tarball | ZIP archive |
| Timelines: | family | ancestors | descendants | both | trunk |
| Files: | files | file ages | folders |
| SHA1: |
4b565c46449807882041de7fcf200d3d |
| User & Date: | drh 2009-09-04 18:39:39.000 |
Context
|
2009-09-04
| ||
| 19:28 | Add the dont-push setting to help facilitate private branches. ... (check-in: d1b948b0c7 user: drh tags: trunk) | |
| 18:39 | Updates to the "sync protocol" document. ... (check-in: 4b565c4644 user: drh tags: trunk) | |
| 16:20 | typos in documentation ... (check-in: 1216eb434a user: bharder tags: trunk) | |
Changes
Changes to www/sync.wiki.
| ︙ | ︙ | |||
382 383 384 385 386 387 388 | <ol> <li>The client sends login and pull cards. <li>The client sends a cookie card if it has previously received a cookie. <li>The client sends gimme cards for every phantom that it holds. <hr> <li>The server checks the login password and rejects the session if the user does not have permission to pull. | | | | | 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 | <ol> <li>The client sends login and pull cards. <li>The client sends a cookie card if it has previously received a cookie. <li>The client sends gimme cards for every phantom that it holds. <hr> <li>The server checks the login password and rejects the session if the user does not have permission to pull. <li>If the number of entries in the unclustered table on the server is greater than 100, then the server constructs a new cluster artifact to cover all those unclustered entries. <li>The server sends file cards for every gimme card it received from the client. <li>The server sends igot cards for every artifact in its unclustered table that is not a phantom. <hr> <li>The client adds the content of file cards to its repository. <li>The client creates a phantom for every igot card in the server reply that mentions an artifact that the client does not possess. <li>The client creates a phantom for the delta source of file cards when the delta source is an artifact that the client does not possess. </ol> <p>These ten steps represent a single HTTP round-trip request. The first three steps are the processing that occurs on the client |
| ︙ | ︙ |