Hey all,
Got this error when I tried to access the disambiguation maintenance
page. Any reason why? Not very php-savvy so all a bit beyond my ken
just now. wfSpecialDisambiguation is broken. Link tables have
changed...
running:
MediaWiki: 1.3.7
PHP: 4.3.4 (cgi)
MySQL: 3.23.58
tia
Al
--
Hello, very useful mailing list here.
Question:
Does anyone have a workable method for uploading multiple files (images
in my case) to wiki? I have a ton of images and I'd like to set up a
<gallery></gallery> with them, but doing it piecemeal just isn't going
to work. I need to upload them as a batch (either by selecting all the
images at once or selecting their parent folder).
The overall idea is that I'd like users to see a very large list of
images, be able to click on any image, and then comment on it. It all
seems workable except the part about actually getting the images into
wiki and automatically building the gallery page :).
Is there php that would support this? Has anyone successfully added this
data directly to mysql? I'm a little lost.
Thanks!
Bart
Hi,
I've created some extensions to make my life easier documenting some of our
projects.
Feel free to give them a shot, and use them at will:
http://public.kitware.com/Wiki/User:Barre/Extensions
Suggestions are welcome.
Bare in mind that I started fiddling with the MediaWiki API a little more
than one week ago, so hold on with the flaming.
--
Sebastien Barre
if i enter a special character like "(" or something in the search field
i always get the error:
Die letzte Datenbankabfrage lautete:
SELECT cur_id,cur_namespace,cur_title,cur_text FROM cur,searchindex
WHERE cur_id=si_page AND ( (MATCH (si_title) AGAINST ('blaa')) ( ) AND
cur_namespace IN (0,11) LIMIT 0, 20
aus der Funktion "SearchEngine::showResults". MySQL meldete den Fehler
"1064: You have an error in your SQL syntax near '( ) AND cur_namespace
IN (0,11) LIMIT 0, 20' at line 1".
how can i correct that?
it is possible to enter special characters in the address field and
create an article via "&action=edit" function.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
MediaWiki 1.4rc1 is a security and bug fix release for the 1.4 beta
series.
== Important security updates ==
A security audit found and fixed a number of problems. Users of MediaWiki
1.3.10 and earlier should upgrade to 1.3.11; users of 1.4 beta releases
should upgrade to 1.4rc1.
=== Cross-site scripting vulnerability ===
XSS injection points can be used to hijack session and authentication
cookies as well as more serious attacks.
* Media: links output raw text into an attribute value, potentially
~ abusable for JavaScript injection. This has been corrected.
* Additional checks added to file upload to protect against MSIE and
~ Safari MIME-type autodetection bugs.
As of 1.3.10/1.4beta6, per-user customized CSS and JavaScript is disabled
by default as a general precaution. Sites which want this ability may set
$wgAllowUserCss and $wgAllowUserJs in LocalSettings.php.
=== Cross-site request forgery ===
An attacker could use JavaScript-submitted forms to perform various
restricted actions by tricking an authenticated user into visiting
a malicious web page. A fix for page editing in 1.3.10/1.4beta6 has
been expanded in this release to other forms and functions.
Authors of bot tools may need to update their code to include the
additional fields.
=== Directory traversal ===
An unchecked parameter in image deletion could allow an authenticated
administrator to delete arbitary files in directories writable by the
web server, and confirm existence of files not deletable.
== Changes since 1.4beta6 ==
* Fix notice error on nonexistent template in wikitext system message
* (bug 1469) add missing <ul> tags on Special:Log
* (bug 1470) remove extra <ul> tags from Danish log messages
* Fix notice on purge w/ squid mode off
* (bug 1477) hide details of SQL error messages by default
~ Set $wgShowSQLErrors = true for debugging.
* (bug 1430) Don't check for template data when editing page that
doesn't exist
* Recentchanges table purging fixed when using table prefix
* (bug 1431) Avoid redundant objectcache garbage collection
* (bug 1474) Switch to better-cached index for statistics page count
* Run Unicode normalization on all input fields
* Fix translation for allpagesformtext2 in LanguageZh_cn and LanguageZh_tw
* Block image revert without valid login
* (bug 1446) stub Bambara (bm) language file using French messages
* (bug 1432) Update Estonian localization
* (bug 1471) unclosed <p> tag in Danish messages
* convertLinks script fixes
* Corrections to template loop detection
* XHTML encoding fix for usernames containing & in Special:Emailuser
* (for zh) Search for variant links even when conversion is turned off,
~ to help prevent duplicate articles.
* Disallow ISO 8859-1 C1 characters and "no-break space" in user names
~ on Latin-1 wikis.
* Correct the name of the main page it LanguageIt
* Allow Special:Makesysop to work for usernames containing SQL special
~ characters.
* Fix annoying blue line in Safari on scaled-down images on description page
* Increase upload sanity checks
* Fix XSS bug in Media: links
* Add cross-site form submission protection to various actions
* Fix fatal error on some dubious page titles
* Stub threshold displays correctly again
Release notes:
http://sourceforge.net/project/shownotes.php?release_id=307068
Download:
http://prdownloads.sf.net/wikipedia/mediawiki-1.4rc1.tar.gz?download
Low-traffic release announcements mailing list:
http://mail.wikipedia.org/mailman/listinfo/mediawiki-announce
Wiki admin help mailing list:
http://mail.wikipedia.org/mailman/listinfo/mediawiki-l
Bug report system:
http://bugzilla.wikipedia.org/
Play "stump the developers" live on IRC:
#mediawiki on irc.freenode.net
- -- brion vibber (brion @ pobox.com)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (Darwin)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCGYICwRnhpk1wk44RAp4SAJ9tUo4wzkeAwe7uJ3tQbKI2ZBYNXwCgyK1a
T6y4UfuG7ejvIOzyiOGq85Q=
=idOV
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
MediaWiki 1.3.11 is a security release.
== Important security updates ==
A security audit found and fixed a number of problems. Users of MediaWiki
1.3.10 and earlier should upgrade to 1.3.11; users of 1.4 beta releases
should upgrade to 1.4rc1.
=== Cross-site scripting vulnerability ===
XSS injection points can be used to hijack session and authentication
cookies as well as more serious attacks.
* Media: links output raw text into an attribute value, potentially
~ abusable for JavaScript injection. This has been corrected.
* Additional checks added to file upload to protect against MSIE and
~ Safari MIME-type autodetection bugs.
As of 1.3.10/1.4beta6, per-user customized CSS and JavaScript is disabled
by default as a general precaution. Sites which want this ability may set
$wgAllowUserCss and $wgAllowUserJs in LocalSettings.php.
=== Cross-site request forgery ===
An attacker could use JavaScript-submitted forms to perform various
restricted actions by tricking an authenticated user into visiting
a malicious web page. A fix for page editing in 1.3.10/1.4beta6 has
been expanded in this release to other forms and functions.
Authors of bot tools may need to update their code to include the
additional fields.
=== Directory traversal ===
An unchecked parameter in image deletion could allow an authenticated
administrator to delete arbitary files in directories writable by the
web server, and confirm existence of files not deletable.
Release notes:
http://sourceforge.net/project/shownotes.php?release_id=307067
Download:
http://prdownloads.sf.net/wikipedia/mediawiki-1.3.11.tar.gz?download
Low-traffic release announcements mailing list:
http://mail.wikipedia.org/mailman/listinfo/mediawiki-announce
Wiki admin help mailing list:
http://mail.wikipedia.org/mailman/listinfo/mediawiki-l
Bug report system:
http://bugzilla.wikipedia.org/
Play "stump the developers" live on IRC:
#mediawiki on irc.freenode.net
- -- brion vibber (brion @ pobox.com)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (Darwin)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCGYHOwRnhpk1wk44RAhlzAKDSk3J8cRhBxD/arNc84uaLqeKAtgCfcJ2m
VRX58OZ0qf0b1dqhmfMFFe4=
=oYqv
-----END PGP SIGNATURE-----
Hi,
I'm trying to write a rss feed aggregator in an extension function. I'm
getting results now but there's a small problem (there's another one that I
couldn't get to, yet). Extension functions are being called twice on save. I
checked this by outputting a line to a debug log. Down below is a small
excerpt from the log:
If you look through it, there are two "Call in extension" lines, one after
submitting the page and one for viewing the updated page. Is this normal?
There was a talk about serving dynamic content from within Mediawiki
recently, after this I will probably have to deal with caching, I know. But
for now, I want to postpone it. I'm using 1.4beta6. By the way, I guess
there was a change in caching between 1.3 and 1.4. I was able to refresh
caches by doing a hard refresh from the browser to get updated pages in
1.3.10 but not in 1.4. I might go back to 1.3 if that's the case. Anyone
have an idea?
Thanks!
---- Log starts here ----
Start request
POST /.../index.php?title=Test&action=submit
[deleted lines]
Content-Length: 741
User::loadFromSession() unable to load from memcached
Using reader #0: localhost
Call in extension: Sunday 20th of February 2005 10:03:09 PM
** private caching; **
Request ended normally
Start request
GET /.../index.php?title=Test
[more deleted lines]
If-Modified-Since: Mon, 21 Feb 2005 03:02:35 GMT
User::loadFromSession() unable to load from memcached
Using reader #0: localhost
-- client send If-Modified-Since: Mon, 21 Feb 2005 03:02:35 GMT
-- we might send Last-Modified : Mon, 21 Feb 2005 03:03:09 GMT
READY client: 20050221030235 ; user: 0 ; page: 20050221030309
tryFileCache() - not cacheable
Trying parser cache xxx:pcache:idhash:924-1!1!0!1!0!1!0!!en
Found.
Key expired, touched 20050221030309, epoch 20030516000000, cached
20050221030237
Call in extension: Sunday 20th of February 2005 10:03:09 PM
Saved in parser cache with key xxx:pcache:idhash:924-1!1!0!1!0!1!0!!en and
timestamp 20050221030309
** private caching; Mon, 21 Feb 2005 03:03:09 GMT **
Request ended normally
>>/tmp IS writeable (I even made it 777).
>>
>>
>
>If safe mode or open_basedir are enabled, that usually won't help you
>one bit. Install 1.4beta6, which doesn't rely on writing a temporary
>compiled template file.
>
>(The proxy key thing is completely unrelated and you may ignore it, it's
>harmless.)
>
>-- brion vibber (brion @ pobox.com)
>
>
Thanks a lot. Safe_Mode was off, but Open_BaseDir was defined. I will
try 1.4 beta 6
Thanks again,
Volker
I have set up a MediaWiki 1.3.10 install, and I am trying to disable the
display of IP addresses for users who are not logged in.
I have set $wgDisableAnonTalk = true, but the IP address and "Talk for this
IP" link still shows up when you try to login and fail. I have even had my
PHP guru go in and edit several functions, remove text.... He cannot get the
link to disappear.
I notice that wiki.mozilla.org as well as meta.wikimedia.org both have this
feature enabled and working perfectly. Does anyone know what I'm missing?
Thanks in advance,
Hîn
Dear all,
when trying to set up a Wiki with MediaWiki 1.3.10 I get the following
error message:
>>
* Script URI path: /wiki
Warning: $wgProxyKey is insecure Can't find a writable temp
directory for the XHTML template. Check that the TMP environment
variable points to a writable directory, or that the default temp
dir (/tmp) exists and is writable.
<<
/tmp IS writeable (I even made it 777).
Any hints?
Thanks a lot in advance!
Volker