Mercurial > libervia-backend
view sat/plugins/plugin_app_manager_docker/sat_app_weblate.yaml @ 3840:5b192a5eb72d
plugin XEP-0277: post repeating implementation:
Repeating a post as specified at https://xmpp.org/extensions/xep-0277.html#repeat is now
implemented. On sending, one can either use the new `repeat` method (or the bridge
`mbRepeat` one from frontends) to repeat any XEP-0277 item, or use the field `repeated` in
microblog data's `extra`. This field must mainly contains the `by` field with JID of
repeater (the "author*" field being filled with original author metadata), and the `uri`
field with link (usually `xmpp:` one) to repeated item.
When receiving a repeated item, the same `repeated` field is filled.
rel 370
author | Goffi <goffi@goffi.org> |
---|---|
date | Wed, 13 Jul 2022 12:15:04 +0200 |
parents | a240748ed686 |
children |
line wrap: on
line source
type: docker-compose prepare: git: https://github.com/WeblateOrg/docker-compose.git files: settings-override.py: content: | USE_X_FORWARDED_HOST = True override: version: "3" services: weblate: ports: - "8080" environment: WEBLATE_DEBUG: 0 WEBLATE_URL_PREFIX: !sat_param [url_prefix, /weblate] WEBLATE_EMAIL_HOST: !sat_conf ["", "email_server"] WEBLATE_EMAIL_HOST_USER: !sat_conf ["", "email_username"] WEBLATE_EMAIL_HOST_PASSWORD: !sat_conf ["", "email_password"] WEBLATE_SERVER_EMAIL: !sat_conf ["", "email_from", "weblate@example.com"] WEBLATE_DEFAULT_FROM_EMAIL: !sat_conf ["", "email_from", "weblate@example.com"] WEBLATE_SITE_DOMAIN: !sat_conf ["", "public_url"] WEBLATE_ADMIN_PASSWORD: !sat_generate_pwd WEBLATE_ADMIN_EMAIL: !sat_conf ["", "email_admins_list", "", "first"] WEBLATE_ENABLE_HTTPS: !sat_conf ["", "weblate_enable_https", "1"] volumes: - ./settings-override.py:/app/data/settings-override.py:ro expose: url_prefix: [override, services, weblate, environment, WEBLATE_URL_PREFIX] front_url: !sat_param [front_url, /translate] web_label: Translate ports: web: service: weblate private: 8080 passwords: admin: [override, services, weblate, environment, WEBLATE_ADMIN_PASSWORD]