core: Allow block cache time to be overridden

0 votes

Vote

Raised 0% of 12 credits
(12 credits = 2 hours or $79.79)

Add a new universal block option, the ttl for that block instance's caching.
That ttl value should become a part of the cache signature, so you can have multiple instances of the same block that are now separately cached (necessary for the main_quote block).

Suggested by Chris Graham on 22nd February 2019

core_database_drivers: Make use of MySQL REPLACE INTO syntax

0 votes

Vote

Raised 0% of 6 credits
(6 credits = 1 hour or $39.89)

put_into_cache and set_value are both highly trafficed functions that do a query_delete (DELETE FROM) followed by a query_insert (INSERT INTO). These cases could be single REPLACE INTO calls in MySQL.

The ideal solution would be to extend the insert_into method to change $fail_ok to take constants QUERY…

Suggested by Chris Graham on 22nd February 2019

core: Automatic image resizing with download-associated-media option

0 votes

Vote

Raised 0% of 12 credits
(12 credits = 2 hours or $79.79)

Change the download checkbox to a list of 4 options:

1) Leave remote media as remote
2) Download all remote media and limit maximum size to <configured maximum image size setting>
3) Download all remote media smaller than <configured maximum image size setting> and leave the rest as remote
4) Downloa…

Suggested by Chris Graham on 20th February 2019

core_feedback_features: Maintain read counts on comment topics

1 vote

Vote

Raised 0% of 6 credits
(6 credits = 1 hour or $39.89)

When a content item is read, it implies the comment topic is read - so increment the view count on the forum.

Suggested by Chris Graham on 7th February 2019

core_upgrader: Better "excessive file permissions" detection

1 vote

Vote

Raised 0% of 24 credits
(24 credits = 4 hours or $159.57)

The excessive file permissions checker currently only checks when non-suEXEC servers have files/directories chmodded as world-writable that don't need to be (hence lowering security as any other web server user may potentially have write access).

Actually there's a more important check we should do. For…

Suggested by Chris Graham on 7th February 2019

core_rich_media: Reconsider how media images are handled

1 vote

Vote

Raised 0% of 12 credits
(12 credits = 2 hours or $79.79)

Have noticed the simple css is not included in the latest release.

[itemprop="articleBody"] img {
max-width: 100%;
height: auto;
}

Without it uploaded images if not manually adjusted will exceed the width of the container.

Also would it be possible to that is an image is reduced in dimensions…

Suggested by Paul Flavel on 27th January 2019

core_cns: Redirect to where you were after validating e-mail address

0 votes

Vote

Raised 0% of 6 credits
(6 credits = 1 hour or $39.89)

It's annoying when signing up to a site, and it not taking you back to where you were.
Composr will do that redirect, except when e-mail address validation isn't enabled. If e-mail address validation is enabled then the join process stops after submitting the form, and then it will just give you a "succes…

Suggested by Chris Graham on 20th January 2019

newsletter: AJAX support for main_newsletter_signup block

1 vote

Vote

Raised 0% of 18 credits
(18 credits = 3 hours or $119.68)

Currently this does a form POST. This is less than ideal for those tightly integrating the block into somewhere deep in their design, such as the footer.

Suggested by Chris Graham on 20th January 2019

core_cns: Admins can not see users that have not validated their e-mail addresses

2 votes

Vote

Raised 0% of 6 credits
(6 credits = 1 hour or $39.89)

When a user joins, they may need to self-validate their e-mail address (depending on configuration).
If they do not do this, there is no obvious way for the admin to do it.

The member directory filters out members who have not completed the process properly (for usability).
The admin_unvalidated modul…

Suggested by larrykh465 on 18th January 2019

core_cns: Search HaveIBeenPwned database

0 votes

Vote

Raised 0% of 12 credits
(12 credits = 2 hours or $79.79)

Use the HaveIBeenPwned API to check is a password has been breached.

https://haveibeenpwned.com/API/v2#PwnedPasswords

We just send the first 5 characters of the sha1 hash of the new password, and get all suffixes that are pwned. We then see if any of these exactly match the sha1 hash of the new passw…

Suggested by Chris Graham on 31st December 2018