Hi All,
We have just got the wikimedia SVN repository access for our project.
While trying to do the setup using Subclipse.
I am giving the following details
URL: svn+ssh://pmwx@svn.wikimedia.org/svnroot/mediawiki/trunk/phase3
then i select the *Use PRivate key authentication
*and give *username*,*password *with port 22.
I get the following message: *Folder does not exist remotely.*
Can someone guide on this.
Thanks
--Viral
Dear wikitech list,
I'm preparing a Spanish Wikipedia snapshot for the One Laptop per Child
laptop, and to get the size down I'm trying to do some article selection
using MWDumper¹. As background, here are the steps I've gone thrown
so far using the eswiki dump:
thunk:cjb~% mysql -u eswiki -p eswiki < eswiki-20080416-pagelinks.sql
mysql> SELECT pl_namespace, pl_title, COUNT(*) INTO outfile \
"/tmp/incominglinks" FROM pagelinks GROUP BY pl_namespace, pl_title
The "incominglinks" file, after processing it to be one article per
line and excluding articles with few inbound links, looks like this:
thunk:cjb~ % wc -l incominglinks.names
162974 incominglinks.names
This is where MWDumper comes in -- I'd like to create an XML dump of
each article in the incominglinks.names. I tried:
thunk:cjb~% java -jar mwdumper-2008-04-13.jar \
--output=bzip2:eswiki_limited.xml.bz2 \
--format=xml \
--filter=list:incominglinks.names \
eswiki-20080416-pages-articles.xml.bz2
MWDumper didn't return any errors, and ran through the whole of the
.bz2 to completion. I then ran:
thunk:cjb~ % perl -nle 'print $1 if /<title>(.*?)<\/title>/' \
< eswiki_limited.xml > incominglinks.output
The resulting file is:
thunk:cjb~ % wc -l incominglinks.output
45395 incominglinks.output
Can anyone think of possible reasons for the discrepancy in number of
articles asked for and received? I've looked briefly at character set
and namespaces, and neither seems responsible. Here is an example of
articles present in the input and not the output:
thunk:cjb~ % grep nuclear incominglinks.names.sorted
Abandono_de_la_energía_nuclear
Accidente_nuclear
Arma_nuclear
Armas_nucleares
Bomba_nuclear
Central_nuclear
[59 matches]
thunk:cjb~ % grep nuclear incominglinks.output.sorted
thunk:cjb~ %
Here are complete versions of the two files above:
http://dev.laptop.org/~cjb/incominglinks.names.sortedhttp://dev.laptop.org/~cjb/incominglinks.output.sorted
So, a few questions:
* Any ideas on what could cause many articles to be being dropped here?
* Is there any further output I could provide that would be useful?
* Is there a tool other than MWDumper that could do this for me?
Thanks very much for any suggestions!
- Chris.
¹: http://www.mediawiki.org/wiki/MWDumper
--
Chris Ball <cjb(a)laptop.org>
nikerabbit(a)svn.wikimedia.org schreef:
> + # Why we don't use Xml::element here?
> + # Is it because if $source is '', it returns <textarea />?
Yes. <textarea /> violates standards and renders very nastily in
Firefox: the rest of the HTML is treated as the textarea's content.
Roan Kattouw (Catrope)
On Tue, May 6, 2008 at 6:49 AM, <werdna(a)svn.wikimedia.org> wrote:
> Log Message:
> -----------
> Revert r34282. User class not created yet, causes fatal errors :(
Is there any reason we don't load AutoLoader.php very early on, before
LocalSettings.php is executed? The overhead is supposed to be minimal
until somebody actually uses the relevant classes, right?
Hi devs,
I've been investigating MediaWiki within my Bachelor's thesis
"Application
of security test tools in open source" at the Free University of Berlin
(FU Berlin) [1].
Basically, I am looking for security measures which have been taken to
prevent security leaks/vulnerabilities especially with security test
tools
MediaWiki is one of the most popular applications across the web. So the
attack area maybe quite large.
I have searched across the wiki itself, the mailist list and repo.
I have noticed some things, I'd like like to remark:
You advise, as most projects do, to turn "register_globals" off to
decrease attack possibilities [3]. A security reponse team [2] handles
security vulnerabilities and patches them immediately. Most releases do
include security fixes.
I am sure that you do anything you can to assure security.
Spite the recommondations and the security team. Does this team
or any other group/person take any measures to assure security with
testing tools, with a special test plan or functional requirements?
Thanks in advance,
Michael
[1] https://www.inf.fu-berlin.de/w/SE/ThesisFOSSSecurityTools
[2] http://www.mediawiki.org/wiki/Security
[3]
http://meta.wikimedia.org/wiki/Documentation:Security#General_PHP_recommend…
--
<NO> OOXML - Say NO To Microsoft Office broken standard
http://www.noooxml.org
Hi,
My IP (83.217.93.246) is considered as an open proxy.
My server is no more a open proxy.
It will be great to remove the constraint.
My wikipedia account is krier.cedric.
Thanks
--
Cédric Krier
With less than three months to go until the fourth annual Wikimania
conference, registration has finally opened and will remain so until
the 15th of June. This year Wikimania starts with the a promise to
"Change the Shape of Wisdom" as it is hosted by Bibliotheca
Alexandrina, the reincarnation of the ancient Library of Alexandria,
one of pillars of this Earth when Philosophy and Wisdom are bought
into question. In Alexandria, from the 17th to the 19th of July, ideas
will be shared and discussed between people from all over the globe,
once again igniting the golden cosmopolitan age of the city.
As always, the conference will take place over 4 different tracks,
with a variety of speakers: Keynote, invited, and other. The
conference tracks this year are:
* Wikimedia Communities - Interesting projects and particularities
within the communities; policy creation within individual projects;
conflict resolution and community dynamics; reputation and identity;
multilingualism, languages and cultures; social studies.
* Free Knowledge - Open access to information; ways to gather and
distribute free knowledge, usage of the Wikimedia projects in
education, journalism, research; ways to improve content quality and
usability; copyright laws and other legal areas that interfere with
Wikimedia projects. Free Content in Middle-East/Africa countries.
* Technical infrastructure - Issues related to MediaWiki development
and extensions; Wikimedia hardware layout; new ideas for development
(including usable case studies from other wikis or similar projects).
* Scientific track - Papers submitted to the scientific track were
peer reviewed by scientific standards and accepted or rejected based
on these reviews. The papers will be published in proceedings
afterwards. Based on the number and the quality of the submission, a
journal special issue may be pursued
This year the conference is taking an interesting direction that hopes
to enlighten third world and Middle Eastern countries about the new
digital realm that is continuously expanding and evolving; as such,
along with many well reputed figures, an emphasis has been put on
bringing in Arab speakers. Speakers include Ahmed N. Tantawy, the
Technical Director of IBM in the Middle East; Eliane Metni, the
founding director of the International Education Association; Tim
Spalding, the founder and lead developer of LibraryThing; Eric M.
Johnson, the team leader for the Knowledge Management Action Team at
the U.S. Department of State; and Usama Fayyad, Yahoo!'s executive
vice president of Research & Strategic Data Solutions.
Take part on one of the most important IT events of the year. Check
the registration prices online.
<http://wikimania2008.wikimedia.org/wiki/Registration>
While these prices do not include accommodation, the local team has
taken the effort to make all sorts of housing opportunities available,
starting from dorms up to luxury hotel rooms. Check these when your
registering. You will also be pleased to know that transportation is
available to and from Cairo International Airport in the 2 days before
and after the conference.
And what is a gathering without fun? Tours and parties are being
planned out for the participants of the event. After all Alexandria is
cultural city that brims with hospitality and the main idea of the
event is to provide a gathering place.
Hope to see you there!
The Wikimania Local Team
----
Please forward this message along to whomever you think will be
interested! (Sorry if you've already this e-mail more than once!)
--
Casey Brown
Cbrown1023
---
Note: This e-mail address is used for mailing lists. Personal emails sent to
this address will probably get lost.
--
Casey Brown
Cbrown1023
---
Note: This e-mail address is used for mailing lists. Personal emails sent to
this address will probably get lost.
> From: vasilievvv(a)svn.wikimedia.org <vasilievvv(a)svn.wikimedia.org>
> Date: May 3, 2008 3:09 PM
> Subject: [MediaWiki-CVS] SVN: [34169] trunk/phase3
> To: mediawiki-cvs(a)lists.wikimedia.org
>
>
> Revision: 34169
> Author: vasilievvv
> Date: 2008-05-03 13:09:34 +0000 (Sat, 03 May 2008)
>
> Log Message:
> -----------
> * (bug 709) Cannot rename/move images and other media files.
> Currently in experimental mode, use $wgAllowImageMoving to enable it.
> Known issues:
> * Doesn't work with rev_deleted
> * May also have some security and caching issues.
>
[...]
> + if( preg_match( '/^(\d+)px-/', $file,
> $matches ) ) {
> + list( $unused, $width ) = $matches;
> + $this->thumbs[] = array(
> + $thumbDirRel . '/' . $file,
> + $newThumbDirRel . '/'
> . $width . 'px-' . $this->newName
> + );
> + } else {
> + wfDebug( 'Strange file in
> thumbnail directory: ' . $thumbDirRel . '/' . $file );
> + }
I don't know whether it is correct to assume that all files are
/^(\d+)px-/. Subclasses of MediaHandler::makeParamString may return an
arbitrary prefix not limited to /^(\d+)px-/. I think it is safest to
simply move all files in the directory to the new location.
[...]
> + function addOlds() {
> + $archiveBase = 'archive';
It may be better to use File::getArchivePath() here.
> _______________________________________________
> MediaWiki-CVS mailing list
> MediaWiki-CVS(a)lists.wikimedia.org
> https://lists.wikimedia.org/mailman/listinfo/mediawiki-cvs
>
Looks all very promising :) I hope that we get this working soon!
Bryan
On Sat, May 3, 2008 at 11:17 AM, Bryan Tong Minh
<dev.btongminh(a)gmail.com> wrote:
> Revision: 34137
> Author: aaron
> Date: 2008-05-02 21:29:05 +0000 (Fri, 02 May 2008)
>
> Log Message:
> -----------
> Don't keep puring squids for images where no thumb is needed (bug 13776)
>
> Modified Paths:
> --------------
> trunk/phase3/includes/filerepo/File.php
[...]
>
> + if ( $wgUseSquid && !$thumb->isError() && $thumb->url != $this->getURL() ) {
> SquidUpdate::purge( array( $thumbUrl ) );
Now that I think about it, shouldn't a purge also be triggered on
error during thumb generation?
Bryan
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
ialex(a)svn.wikimedia.org wrote:
> Moved constant definition to populateParentId.inc, throws an E_NOTICE when used by update.php, thanks to MinuteElectron for reporting it.
>
> +define( 'BATCH_SIZE', 200 );
A more general problem is that this is a pretty generic name; a
BATCH_SIZE is defined with a different value in updateRestrictions.php
and could easily appear elsewhere.
- -- brion vibber (brion @ wikimedia.org)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iEYEARECAAYFAkgbbE8ACgkQwRnhpk1wk47wNQCffm+wjGuGlfw3pK6Dr2hq4M2r
DasAoKV8OoqCaY2/w3dk/C3X9TTYRIcQ
=83Dj
-----END PGP SIGNATURE-----