Age | Commit message (Collapse) | Author |
|
|
|
|
|
group_member_profile_id_created_idx to group_member table, streamlines sorting of your group memberships in the sidebar
|
|
|
|
profile_role_role_created_profile_id_idx index on profile_role
|
|
notice_conversation_created_id_idx index on notice, replacing more limited notice_conversation_idx
|
|
see: http://groups.google.com/group/twitter-api-announce/msg/34b013f4d092737f
|
|
ideally indexed yet.
|
|
indexed, but will use updated sorting method.
|
|
notice_repeat_of_created_id_idx index to replace notice_repeatof_idx
|
|
that's not there. use the limit var which is there instead
|
|
group_inbox_group_id_created_notice_id_idx index to group_inbox table
|
|
reply_profile_id_modified_notice_id_idx index to reply table
|
|
notice_tag_tag_created_notice_id_idx index added to notice_tag
|
|
|
|
optimization as no other attributes are necessary.
Thanks to drslump reported at http://status.net/open-source/issues/2955
|
|
remains bad -- we need some DB changes to make this one nice)
|
|
Notice::addSinceId() and Notice::addMaxId()
|
|
building where clauses for since_id/max_id parameters. Can override the field names from 'id' and 'created'.
|
|
http://status.net/wiki/Sorting_changes
|
|
|
|
given notice, even if it's been deleted. To be used for converting since_id/max_id processing to use timestamp sorting internally.
|
|
|
|
|
|
that trigger filesort or temporary table
|
|
|
|
views with ssl=sometimes
These have been failing for ages due to our outputting full URLs all the time, usually with the default protocol instead of the current one.
Forms would get output with an http: URL in their contents even when destined for an HTTPS page; while a regular form submission would just warn you about the secure->insecure transition, the AJAX code was failing outright and then not bothering to fall back to the regular submission.
I found it was easy to detect the mismatch -- just check the target URL and the current page's protocol before submitting.
Since failing over to non-AJAX submission to the HTTP URL throws up a warning, I figured it'd be easier (and much nicer for users) to just let it rewrite the target URL to use the secure protocol & hostname before doing the final submit.
This check is now automatically done for anything that calls SN.U.FormXHR() -- making most of our buttons on notices and profile/group headers work naturally.
The notice form setup code also runs the rewrite, which gets posting working without an error dialog.
I'd prefer in the long run to simply use relative URLs in most of our output; it avoids this problem completely and lets users simply stay in the current protocol mode instead of being constantly switched back to HTTP when clicking around.
(Note that folks using the SSLAlways extension to Firefox, for instance, will have their browsers constantly sending them back to HTTP pages, mimicking the desired user experience even though we haven't fully implemented it. These folks are likely going to be a lot happier with forms that submit correctly to go along with it!)
|
|
that broke help command, could be generally wonky
Previous code was importing nodes from the XHR result into current document, then pulling text content of what might be the right element, then concat'ing that straight into HTML. Eww! Now pulling the text content straight from the XHR result -- same element that we check for existence of -- and using jQuery's own text() to do the getting and setting of text. Also note that some browsers might have been pulling HTML instead of text, or other funkiness.
|
|
but some is kinda.... funky :D
These comments are all stripped during minification, so util.min.js remains unchanged.
|
|
|
|
mode in and out
|
|
|
|
|
|
|
|
|
|
operations made with mouse or menu
This uses the 'copy' and 'paste' DOM events to trigger a counter update. I haven't had a chance to 100% confirm that middle-button click on X11 triggers the event, but it ought to.
Cut and paste events from context menu and main edit menu known good in:
* Firefox 4.08b-pre
* IE 9 preview 7
* IE 8 current
* Chrome 8 beta current
* Safari 5.0.3
Opera is listed as not supporting these events, oh well.
Note that using a *delete* command from a menu doesn't trigger an event. Sigh, you can't win everything.
|
|
variables in ostatus profile discovery (these cases hit checking diaspora accounts)
|
|
Tweaked ApiStatusesShow and ApiTimelineUser to still claim read-only when hit with a HEAD request (usually link checkers or a precursor to a GET, and should be semantically equivalent to a GET without actually transferring data)
|
|
Router entry for AtomPubService was slightly off, generating an incorrect link in the RSD data.
|
|
it disappears after deletion
|
|
|
|
|
|
|
|
(wrong parameter meant we got the main page instead of the message's URL)
|
|
checking on Atom input
|
|
|
|
|
|
|
|
|
|
|