I recently found the idea of
* lazy rendering (of tables, images, media objects)
Has application of lazy load techniques ever been considered for
MediaWiki pages?
Here are some pointers:
* https://github.com/ressio/lazy-load-xt Lazy load XT (fully featured
version)
*
Am 03.09.2014 um 20:56 schrieb Toni Hermoso Pulido:
If no other choice, I will do some rewriting.
I'll inspect for examples of POST here:
http://www.mediawiki.org/wiki/Category:API_extensions
Another nice example is the extension AJAXPoll
http://www.mediawiki.org/wiki/Extension:AJAXPoll
Am 22.07.2014 04:35, schrieb Sumana Harihareswara:
Hi all! Check out
https://www.mediawiki.org/wiki/Security_for_developers/Architecture -- I
just removed the {{draft}} tag.
added to this as a new section to MSG the
https://www.mediawiki.org/wiki/Manual:MediaWiki_Security_Guide book
Am 11.07.2014 00:25, schrieb Erik Moeller:
Since 2008, we've offered a small feature to download printed books
from Wikipedia article. This is done in partnership with a company
called PediaPress.
They've sold about 15K books over that time period, not enough to
break even, and the
The present notification systems works fine - why do you want to change it?
When you change it, I would like to see a simple solution which works
out-of-the-box for all installers, and includes the source code in our repo.
Not a new solution which depends on other big and probably messy modules
Am 10.06.2014 09:33, schrieb Erik Moeller:
On Mon, Jun 9, 2014 at 11:14 PM, Pine W wiki.p...@gmail.com wrote:
FWIW, for me as a power user who watches many discussions simultaneously on
multiple wikis, a unified watchlist and more refined tools for watchlist
management are among the features
Am 09.06.2014 11:42, schrieb David Gerard:
I wonder how much everyone would hate us if we just replaced talk
pages with Apache Wave ...
or Etherpad
___
Wikitech-l mailing list
Wikitech-l@lists.wikimedia.org
Hello,
recently I saw this edit of a template page on MediaWiki
https://www.mediawiki.org/w/index.php?title=Template:RSSPostoldid=979205 by
an anon.
Do we really have the template Namespace on MediaWiki open for edits by
anons?
In my view, this should be changed.
Hello,
recently I saw this edit of a template page on MediaWiki
https://www.mediawiki.org/w/index.php?title=Template:RSSPostoldid=979205
by an anon.
Do we really have the template Namespace on MediaWiki open for edits
by anons?
In the past, /this /page was indeed a vey /sensitive
Am 18.04.2014 23:20, schrieb Antoine Musso:
Le 18/04/2014 16:17, Tomasz W. Kozłowski a écrit :
Just dropping a short note that it is now finally possible to
subscribe to the weekly Tech News bulletin[1] via a web feed to ensure
a smooth, hassle-free delivery of every issue to a news aggregator
MediaWiki developers:
http://www.php.net/archive/2014.php#id2014-04-02-1 (02 Apr 2014):
The PHP development team announces the immediate availability of PHP
5.5.11.
Several bugs were fixed in this release, some bundled libraries updated
and a security issue has been fixed :
CVE-2013-7345. We
Am 02.04.2014 15:45, schrieb Brad Jorsch (Anomie):
On Tue, Apr 1, 2014 at 11:59 PM, Brian Wolff bawo...@gmail.com wrote:
use tabs for indentation instead of spaces to be like the rest of
mediawiki?
I was going to say the same thing. Why wasn't that caught in code review?
If these files
Am 11.03.2014 12:57, schrieb Federico Leva (Nemo):
This conversation would IMHO be more appropriate on mediawiki-l
because it affects mainly third parties who care about the higher
privacy standards of EU, but thanks for starting it.
I think, a bugzilla should be filed for this cookie issue
RE: https://bugzilla.wikimedia.org/show_bug.cgi?id=62233
There's a problem is somewhere in the core which causes warnings.
Can anyone confirm who runs a recent core version younger than 2014-02-28 ?
Logfiles in my recently upgraded (git pull) installations are filling up
with warnings
not 100% specific for MediaWiki, but be informed
*** to whom it may concern ***
Every version of GnuTLS found to be vulnerable to certification bypass.
See
http://packetstormsecurity.com/files/125521/GNU-Transport-Layer-Security-Library-3.2.12.html
and look on Twitter for gnutls
The
Am 23.02.2014 02:22, schrieb Moriel:
https://github.com/mooeypoo/MediaWiki-ExtensionStatus
https://www.mediawiki.org/wiki/Extension:ExtensionStatus
...
So, does anyone want to join in and help revisit the code?
It appears to me that you need at least bring your extension in line
with the
https://www.mediawiki.org/wiki/MVL offers
ready-for download PDF and ebook versions of up-to-date collections of
articles like
MediaWiki Developer's Guide (MDG)
MediaWiki Security Guide (MSG)
and more.
___
Wikitech-l mailing list
Am 05.02.2014 23:03, schrieb Brion Vibber:
Is the 72-byte truncation a general bcrypt problem or specific to
password_hash()? Any concerns or a non-issue? Note that some non-Latin
strings can only fit 24 chars in 72 bytes of UTF-8. Long enough for most
passwords, but some people like
Where we are at it:
This en-wiki article
[2] - https://en.wikipedia.org/wiki/Bcrypt
currently lacks the important information of the password limitation. Should be
added by someone who's an expert in that field.
___
Wikitech-l mailing list
Am 17.01.2014 20:08, schrieb Marc A. Pelletier:
The problem isn't straight up vandalism (IPBE is no help there -- the
account'd get swiftly blocked) but socking. POV warriors know how to
misuse proxies and anonymity to multiply their consensus, and having
IPBE and editing through any sort of
The PHP development team announces the immediate availability of PHP
5.4.24. About 14 bugs were fixed. All PHP 5.4 users are encouraged to
upgrade to this version.
The PHP development team announces the immediate availability of PHP
5.5.8. This release fixes about 20 bugs against PHP 5.5.7
I started that thread.
1. Please refer to https://bugzilla.wikimedia.org/show_bug.cgi?id=59146
Enabling also edit access to Wikipedia via TOR which much better
allows tracking of this issue towards to find a practical solution.
2. Recommended reading:
Peter Wayner Disappearing Cryptography
Hi,
during the 30C3 Congress [1] in Hamburg - where neither Wikipedia
Foundation nor MediaWiki were formally present this year (but should be
next year)-
Jacob Appelbaum [2] - core member of the TOR project - complained in one
of his numerous talks that the (edit) access to Wikipedia via TOR is
On Monday, December 30, 2013, Thomas Gries wrote:
Hi,
during the 30C3 Congress [1] in Hamburg - where neither Wikipedia
Foundation nor MediaWiki were formally present this year (but should be
next year)-
Jacob Appelbaum [2] - core member of the TOR project - complained in one
of his
I understand Jacob's remarks as a welcome call to the TOR
community to work more intensively with Wikipedians to understand the
actual issues that motivated Wikipedia's TOR block.
This is, why we (or some core) MediaWiki developers should also attend
such congresses like the C3 regularly.
, Thomas Gries m...@tgries.de wrote:
Can you explain this briefly, or send me a pointer ?
This single info can be a help for him and others.
(Honestly, I do not know, what a trusted account/user is.)
I am on #mediawiki now
There is a special permission that allows specific accounts
I opened
https://bugzilla.wikimedia.org/show_bug.cgi?id=59146 -Enabling access
and edit access to Wikipedia via TOR
for discussions
T.
___
Wikitech-l mailing list
Wikitech-l@lists.wikimedia.org
https://lists.wikimedia.org/mailman/listinfo/wikitech-l
Please can you discuss it on the bugzilla
https://bugzilla.wikimedia.org/show_bug.cgi?id=59146
where it can better be tracked ?
___
Wikitech-l mailing list
Wikitech-l@lists.wikimedia.org
https://lists.wikimedia.org/mailman/listinfo/wikitech-l
Am 16.12.2013 13:08, schrieb Arcane 21:
I've tried PHP 5.5.0, had to go back to PHP 4.4.9 due to issues with deleting
and moving pages in MediaWiki.
We need more details. Which version of MediaWiki do you use ?
I never encountered any problems with the latest PHP versions
5.5.0...5.5.7 and
PHP users are strongly advised to upgrade their PHP versions:
PHP 4.0.6 - PHP 4.4.9
PHP 5.0.x
PHP 5.1.x
PHP 5.2.x
PHP 5.3.0 - PHP 5.3.27
PHP 5.4.0 - PHP 5.4.22
PHP 5.5.0 - PHP 5.5.6
Vendor Status: Vendor has released PHP 5.5.7, PHP 5.4.23 and PHP 5.3.28|.||
If you compile PHP from its sources,
https://events.ccc.de/congress/2013/wiki/Main_Page
The 30th Chaos Communication Congress (30C3) is an annual four-day
conference on technology, society and utopia.
Hello,
I justed wanted to know if someone plans to travel to Hamburg, and
whether there are any planned MediaWiki-related
Am 10.12.2013 21:30, schrieb Jeroen De Dauw:
At least half a dozen people from WMDE will be there. Unlike last year, we
will not have a stand. MediaWiki as a whole does seem out of scope for the
congress, if one considers the topics covered there. I did hear some thing
about the FOSDEM wiki
The sites are updated weekly, sometimes with additional deployments
inbetween the scheduled ones. Constant sitenotice would be a bad idea.
I suggest you subscribe to https://meta.wikimedia.org/wiki/Tech/News ,
I suggest that MediaWiki uses Twitter to announce new MediaWiki versions
like -
Hello,
before reinventing the wheel, I want to ask,
whether someone has a *tool *with which we can
* filter a list of bugzilla urls
* so that all those urls where the bugzilla page shows status
resolved are *removed *from the list.
Tom
A new version is available!
All users of contemporary MediaWiki versions since 1.20+ are encouraged
to update to this version.
* Manual and installation https://www.mediawiki.org/wiki/OPENID
Don't forget to run php maintenance/update.php
if you haven't done this for a longer time.
* Code
On Mon, 2013-09-09 at 20:37 +0530, Irosh Liyanage wrote:
When I'm trying to install wikimedia in my local server (xampp) I'm
getting this ERROR ! Please help me to fix this ASAP!thanks
Here's the error
Connected to mysql 5.1.40; You are using MySQL 4.1 server, but
PHP is linked to old
to whom it may concern:
It has been reported, that myOpenID will close down for good in February
2014.
Users of this OpenID registrar will have to go elsewhere.
https://news.ycombinator.com/item?id=6329158
http://www.theregister.co.uk/2013/09/05/myopenid_closes_for_good_2014/
Today, I published a new version of the extension OpenID.
- adds the long-wanted option for Admins to pin logins to a single
(fixed, or forced) OpenID Provider.
- defines parameters of OpenID provider/s in an array. Parameters are no
longer hard-coded on several places like in the CSS.
- fixes
Brion wrote
* stop exposing IP addresses of any users at all (whether logged-in or
anonymous)
+1
replace IP editing with a simple solution for creating a consistent
anonymous identity with a minimum of effort (for example, automatically
create an ID cookie which links to an anonymous 'account'
New version of WinSCP includes PuTTY 0.63
see http://winscp.net/eng/docs/history#5.1.7
___
Wikitech-l mailing list
Wikitech-l@lists.wikimedia.org
https://lists.wikimedia.org/mailman/listinfo/wikitech-l
Am 12.08.2013 16:18, schrieb Daniel Barrett:
The extension [1] changes the RC view so that any changed article is only
listed *once*.
Are you aware that Preferences has an option to do something similar?
Group changes by page in recent changes and watchlist (requires JavaScript)
D
Yes, I
The extension [1] changes the RC view so that any changed article is
only listed *once*.
A new *option* on the preferences Recent changes tab is added which
allows users to have
- each change (default) or
- only the most recent change per changed page
shown in the RC list.
Code on GitHub, see
see security warning by the author Simon Tatham
http://lists.tartarus.org/pipermail/putty-announce/2013/18.html
All the pre-built binaries, and the source code, are now available
from the PuTTY website at
http://www.chiark.greenend.org.uk/~sgtatham/putty/
Am 29.07.2013 21:31, schrieb Ryan Lane:
That ssllabs link also shows that wikimedia has RC4 encryption enabled
on SSL connections, which offers no real security. This is apparently
related to the TLS 1.0 -vs- TLS 1.1/1.2 issue:
The extension OpenID loads a CSS file via RL:
$myResourceTemplate = array(
'localBasePath' = $path . '/skin',
'remoteExtPath' = 'OpenID/skin',
'group' = 'ext.openid',
);
...
$wgResourceModules['ext.openid.icons'] = $myResourceTemplate + array(
'styles' = 'openid.css',
Am 03.07.2013 13:47, schrieb Ori Livneh:
How to contruct the background-image filename from a value in one of the
OpenID PHP modules ?
For a single rule, you can get away with something like:
$wgHooks[ 'BeforePageDisplay' ][ ] = function ( $out, $skin ) {
$out-addHeadItem( 'oauth-provider',
I found the solution ( $wgExtensionAssetsPath )
How to contruct the background-image filename from a value in one of the
OpenID PHP modules ?
For a single rule, you can get away with something like:
$wgHooks[ 'BeforePageDisplay' ][ ] = function ( $out, $skin ) {
$out-addHeadItem(
Am 04.07.2013 04:19, schrieb Matthew Flaschen:
Someone proposed to have a _distinct color for status unmaintained._
Status unmaintained is currently signalled with gray color, the same
as for status unknown
This makes sense to me. Go for it.
We as users cannot change the colors, because
PHP codestyle question re. isset( $array['key'][0] ) versus
array_key_exists( 0, $array['key'] )
On a recent patch [1], we had a discussion what is - or may be - better
* isset( $array['key'][0] )
* array_key_exists( 0, $array['key'] )
This is still unclear after consultation of these
Am 02.07.2013 18:47, schrieb Brion Vibber:
On Tue, Jul 2, 2013 at 9:40 AM, Thomas Gries m...@tgries.de wrote:
PHP codestyle question re. isset( $array['key'][0] ) versus
array_key_exists( 0, $array['key'] )
On a recent patch [1], we had a discussion what is - or may be - better
* isset
Someone proposed to have a _distinct color for status unmaintained._
Status unmaintained is currently signalled with gray color, the same
as for status unknown
The current color scheme can be found at the lower part of page:
https://www.mediawiki.org/wiki/Extension_status
The proposal was added
for your information:
source: http://php.net/archive/2013.php#id2013-06-20-17
The PHP development team is proud to announce the immediate availability
of PHP 5.5.0.
This release includes a large number of new features and bug fixes.
The key features of PHP 5.5.0 include:
Added generators
Am 09.06.2013 19:49, schrieb Tyler Romeo:
What I'm really excited about is PHP 5.5, which has generators, finally
clauses, dereferencing of container literals, and a new password hashing
API
and let me add: . the integrated ZEND opcode cache in 5.5
see
I recently try to modernize an extension [1] to use the /_Html _/class
and found a problem (at least for me) .
Like to receive your comments, and tips.
In several cases, I had to use Htlm::rawElement (*) instead of the safer
Html::element because of a nested div structure I want to generate like
RE: https://www.mediawiki.org/wiki/Extension:AJAXPoll
Today, I published a new version of the AJAXPoll extension.
Most important change:
poll results are only shown for users who have voted.
Can be configured (deactivated) per-wiki, and also per-poll (see manual).
A database schema change is
Am 20.05.2013 18:11, schrieb Tyler Romeo:
I'm confused as to what the point of action=render is. How is it different
from using the API?
I do use it (action=render) in rendering the content div of a mediawiki
A in a different web page B,
in the context of the authenticated user, in an iframe.
Am 14.05.2013 08:43, schrieb Matthew Flaschen:
Or set up some caching ...
+1 for _/*caching */_(like for RSS feeds)
See Extension:RSS, for example.
___
Wikitech-l mailing list
Wikitech-l@lists.wikimedia.org
Am 13.05.2013 21:12, schrieb Moriel Schottlender:
Guys - thank you so much for the comments, I really appreciate it!
Hi,
I just wanted to _/mention/_:
1.
This was merged into MediaWiki core on 16.04.2013:
https://gerrit.wikimedia.org/r/#/c/54986/
Add git HEAD date to Special:Version for core and
Hi,
perhaps I am too naive that it could be implemented with a git-based repo,
but is there a kind of download, clone, or access statistics available
for core and extensions ?
___
Wikitech-l mailing list
Wikitech-l@lists.wikimedia.org
tl;dr
New OpenID extension version 3.30 20130505
https://www.mediawiki.org/wiki/Extension:OpenID
A new version 3.30 20130505 has been published today.
It's a security fix and fixes some CSRF and XSS vulnerabilities.
The new version is strongly recommended.
Has been tested and works with latest
Am 13.04.2013 16:32, schrieb Mark A. Hershberger:
On 04/13/2013 04:48 AM, Mathieu Stumpf wrote:
I'm new to this ml, and would like to have some relevant links so I can
gather information to have a global overview of how you organize and how
to make useful contributions.
RE: https://gerrit.wikimedia.org/r/#/c/54986/
code working live on
http://openid-wiki.instance-proxy.wmflabs.org/wiki/Special:Version
Ready for merge into core.
Can some please merge, thanks.
I invested a lot of efforts to fix (implement) add git HEAD commit date
to Special:Version for core and
For those being interested:
Mozilla Persona is an open authentication system that lets you
implement sign-in on your site in an afternoon. Today, Persona Beta 2
was released, including a feature called Identity Bridging that lets
hundreds of millions of users sign into sites supporting Persona
I suggest renaming of pages
1. Cross-site scripting = Cross-site scripting (XSS, XSSI)
https://www.mediawiki.org/wiki/Cross-site_scripting
2. Cross-site request forgery = Cross-site request forgery (CSRF)
https://www.mediawiki.org/wiki/Cross-site_request_forgery
Before doing that I want to be
Am 22.03.2013 07:29, schrieb K. Peachey:
What actual benefit with having their abbreviation in the title archive?
Make users aware at the first glance to the TOC, that XSS is this and
CSRF is that if they did not yet know this.
You, as expert, can overread the part in parentheses.
I am the
Am 22.03.2013 08:26, schrieb Daniel Friesen:
You, as expert, can overread the part in parentheses.
Including the abbreviation into the title seems quite a non-standard
thing to do. Parenthesis are typically used for disambig, not adding
extra versions of the title.
I fixed it locally on
Am 22.03.2013 12:16, schrieb Platonides:
Trying to clarify:
APC can do two things:
1) Keep the compiled php opcodes, so php execution is faster.
2) Allow the application to store values in the web server memory (kept
accross requests).
ZendOptimizer only does 1.
MediaWiki only needs to
just one message, just arrived:
http://php.net/archive/2013.php#id2013-03-21-1
PHP 5.5.0 beta1 available 21-Mar-2013
The PHP development team announces the release of the first beta of PHP
5.5.0. This release is the first to include the Zend OPCache. Please
help our efforts to provide a stable
tl;dr
discussion start How/whether MediaWiki could use ZendOptimizuerPlus
Since a short time
* ZendOptimizerPlus (Opcode cache; source [4])
is under PHP license and planned to be integrated in PHP 5.5.
The former restrictions of this program (closed-source etc.) appear to
be gone,
so I'd
Am 21.03.2013 15:23, schrieb Chad:
You're confusing opcode caching with shared memory caching.
thanks, as already mentioned, I anticipated that difference.
Having the Zend
Optimizer doesn't prohibit you from using APC's shared memory caching.
But APC has issues with PHP 5.4 .
What can we
Am 21.03.2013 15:57, schrieb Chad:
Sure, it'd be an improvement--go ahead and file a bug wherever it
belongs upstream (github?). If and when they decide to implement
it, *then* would be the time to make MW changes :)
Where can I read more (and can then refer to it) about how MediaWiki
uses the
* Write an extension to support XML Sitemaps without using command line
+1
i like that and have use cases for such an extension.
Yes, please
___
Wikitech-l mailing list
Wikitech-l@lists.wikimedia.org
Perhaps you've read that Google will drop their RSS services and also
RSS chrome extension.
I want to inform you about how MediaWiki can help.
+ https://www.mediawiki.org/wiki/Extension:RSS
consume RSS feeds from elsewhere and render them one or more MW wiki pages
+
https://github.com/Wikinaut/MySimpleCertViewer
With Tyler's help, thanks again, it
+ doesn't shell out any longer
+ uses PHP streams
+ becomes a function getCertificateInfo() which returns an array
You'll like it
|[x-server] = www.google.org
[x-port] = 443
[x-retrieval-time] =
https://github.com/Wikinaut/MySimpleCertViewer
Because I couldn't find that on the net, I wrote a tiny certificate
viewer in PHP to inspect fingerprints (MD5, SHA1, SHA256) and other data.
Maybe a starting point for you to bake your own cert inspectors.
T.
signature.asc
Description: OpenPGP
tl;dr
MediaWiki Security Guide
https://www.mediawiki.org/wiki/MSG
PDF or e-book format available
Am 14.03.2013 20:37, schrieb Quim Gil:
If you are developing for MediaWiki and you haven't gone through one
of our security trainings before, this session is for you:
Yes: we have a Virtual
Am 12.03.2013 02:51, schrieb Rob Lanphier:
I was able to do the clone in 50 seconds over HTTPS
Ori, have you tried this with --depth 1?
Rob
I added - already some weeks ago - this comment to our main download
_talk_ page
Am 10.03.2013 21:48, schrieb Ori Livneh:
Raimond wrote:
The RSS extension is live on Foundationwiki and Mediawikiwiki. Are there
any security/performance reasons to not enabling it on a Wikipedia?
Extension:RSS recently underwent a major revision which (among other things)
changed .. to
Am 08.03.2013 10:07, schrieb Yuvi Panda:
Was this the last blocker to getting the extension deployed?
One, two or three further non-sec-related patches will follow in the
next days
which improve the user GUI, especially the preference tab for OpenID.
stay tuned...
Regards,
Tom
signature.asc
https://bugzilla.wikimedia.org/show_bug.cgi?id=45915
I think, we should use Twitter in addition to the mailinglist.
I am not a fan of all new tools, but many OSS projects (owncloud,
mailvelope) post their breaking news there.
We do not (yet).
signature.asc
Description: OpenPGP digital
Am 09.03.2013 00:04, schrieb Chad:
I think, we should use Twitter in addition to the mailinglist.
You're joking, right?
-Chad
Why do you think I am joking ?
Major changes can be signalled there - or did I miss something ?
___
Wikitech-l mailing
Am 07.03.2013 21:09, schrieb Petr Bena:
ah ok I was confused by it being flagged stable
Yes. It *is* stable, at least since I took over the maintenance a long
time ago.
This does not say, that it cannot be further improved.
Currently I am very busy adding new necessary features to the user
Problem:
Extension:OpenID adds a new pref tab (OpenID) [1,3],
but the fieldset.../fieldset, and legendsection header texts/legend
are apparently _not_ correctly set up in the page HTML, or they are not
correctly rendered.
See [3].
Pls compare [3] (sections missing) and [4] (correctly
Am 04.03.2013 07:47, schrieb Grunny:
what is missing in the code ?
If you want the fieldset to appear, I believe you just need to change
all the 'section' = 'openid', in the preference arrays to 'section'
= 'openid/openid', and then it will use the prefs-openid message,
which you have already
I run a bigger bleeding-edge-software MediaWiki via SSL on a Raspberry Pi.
And that's not too slow because I use APC.
My quick tip of the day
# add APC (Alternative PHP Cache)
# seehttps://www.mediawiki.org/wiki/Extension:APC
# stop your web server
service apache2 stop
# Install APC
apt-get
RE: https://www.mediawiki.org/wiki/Extension:OpenID (manual page)
Just my few meta points:
if you should find bugs so, please file them here
https://bugzilla.wikimedia.org/enter_bug.cgi?product=MediaWiki%20extensionscomponent=OpenID
Open bugs are
Ryan wrote:
Any OpenID consumer, whether WMF or not, would be able to use us as an
authentication provider.
There is currently no option, but an option (to restrict serving OpenIDs
to certain
consumer domains eg. only to our domain) could be implemented.
Tom
This would also be useful for test wikis people set up on labs. You could
just authenticate via openid instead of creating a new account.
You can already test this here :
http://openid-wiki2.instance-proxy.wmflabs.org/wiki
___
Wikitech-l mailing
see also https://bugzilla.wikimedia.org/show_bug.cgi?id=9604 (2007)
Support OpenID extension on all wikimedia projects
___
Wikitech-l mailing list
Wikitech-l@lists.wikimedia.org
https://lists.wikimedia.org/mailman/listinfo/wikitech-l
Am 23.02.2013 05:40, schrieb Brian Wolff:
Some sites, like Stack Overflow, allow you to add alternate OpenIDs,
which helps for temporary or permanent downtime.
Presumably you would have to do that before the downtime though as you
wouldn't be able to login once downtime starts. So one could
Am 23.02.2013 00:48, schrieb Ryan Lane:
On Fri, Feb 22, 2013 at 3:19 PM, Tyler Romeo tylerro...@gmail.com wrote:
To be absolutely clear, this does *not* solve the problem of bots/tools
authenticating on behalf of a user. All it does is solve the problem of
where a bot/tool authenticates under
Manual
https://www.mediawiki.org/wiki/Extension:RSS
Code tree
https://gerrit.wikimedia.org/r/gitweb?p=mediawiki/extensions/RSS.git;a=tree
Release Notes
https://gerrit.wikimedia.org/r/gitweb?p=mediawiki/extensions/RSS.git;a=blob_plain;f=RELEASE-NOTES;hb=HEAD
This is the submission to git after
tl;dr
NEW version 2.01 of Extension:OpenID published
RE: https://www.mediawiki.org/wiki/Extension:OpenID (new light manual)
RE:
https://gerrit.wikimedia.org/r/gitweb?p=mediawiki/extensions/OpenID.git;a=commit;h=86e339bc695c72796014607da0223fd9d3341af9
RE:
Yes, that is the prime reason we're still on 1.17 at work, it's the
most recent version the FCKEditor extension works on.
@Admins who use FCKEditor:
please be reminded that be reminded, that FCKEditor has severe security
issues.
___
Wikitech-l
Am 07.02.2013 21:46, schrieb OQ:
On Thu, Feb 7, 2013 at 2:39 PM, Thomas Gries m...@tgries.de wrote:
@Admins who use FCKEditor:
please be reminded that be reminded, that FCKEditor has severe security
issues.
Yes, but as I mentioned until there is a suitable replacement, your
choices are: run
Am 21.01.2013 09:48, schrieb Robert Vogel:
Hi Krinkle!
Thanks for the clarification!
mediawiki.searchSuggest does NOT use jquery.ui.autocomplete.
Yes, I know. I never said anything like this. Maybe this was a
misunderstanding. I said I wanted to replace mediawiki.searchSuggest with
my
Good news for the few Windows users of you.
I succeeded in accessing my labsconsole VM using
* PuTTY and
* WinSCP
with appropriate proxy (PuTTY) respectively tunnel (WinSCP) settings via
the bastion server.
_This will be documented in the next days_ (sorry, not earlier) on
Am 04.01.2013 18:02, schrieb Mark A. Hershberger:
* FCKeditor is no longer supported for MediaWiki, but people are still
using it and, for some reason, like what it provides. If we can make
the Visual Editor available to them, I'm hoping the need for FCKeditor
will disappear.
Hi Mark,
and
Am 04.01.2013 19:57, schrieb Mark A. Hershberger:
Even more reason for us to get VE working against 1.19. I saw that
some people have added instructions for FCKeditor on 1.19, but VE
would be much more compelling if we can get it working.
Yes!
Switching between MediaWiki Wiki syntax and the
RE: https://www.mediawiki.org/wiki/MVL
I updated the book collections in the MVL:
- replaced obsolete SVN articles with their git/gerrit counterparts
- modified the saved_book template: in addition to PDF downloads, e-book
epub download link is available
These books are presently in the MVL
1 - 100 of 294 matches
Mail list logo